catalog/stable/strapi/2.0.11/security.md

4301 lines
4.7 MiB
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
hide:
- toc
---
# Security Overview
<link href="https://truecharts.org/_static/trivy.css" type="text/css" rel="stylesheet" />
## Helm-Chart
##### Scan Results
#### Chart Object: strapi/charts/postgresql/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-postgresql&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | <details><summary>Expand...</summary> Enforcing CPU limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;resources.limits.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv011">https://avd.aquasec.com/appshield/ksv011</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-postgresql&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | <details><summary>Expand...</summary> When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;resources.requests.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv015">https://avd.aquasec.com/appshield/ksv015</a><br></details> |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | <details><summary>Expand...</summary> When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;resources.requests.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv016">https://avd.aquasec.com/appshield/ksv016</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv017">https://avd.aquasec.com/appshield/ksv017</a><br></details> |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | <details><summary>Expand...</summary> Enforcing memory limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;resources.limits.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv018">https://avd.aquasec.com/appshield/ksv018</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-postgresql&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-postgresql&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | <details><summary>Expand...</summary> HostPath volumes must be forbidden. <br> <hr> <br> StatefulSet &#39;RELEASE-NAME-postgresql&#39; should not set &#39;spec.template.volumes.hostPath&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv023">https://avd.aquasec.com/appshield/ksv023</a><br></details> |
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;spec.securityContext.runAsGroup&#39;, &#39;spec.securityContext.supplementalGroups[*]&#39; and &#39;spec.securityContext.fsGroup&#39; to integer greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv029">https://avd.aquasec.com/appshield/ksv029</a><br></details> |
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;postgresql-init&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-strapi&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | <details><summary>Expand...</summary> Enforcing CPU limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;resources.limits.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv011">https://avd.aquasec.com/appshield/ksv011</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;RELEASE-NAME-strapi&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;postgresql-init&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-strapi&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;postgresql-init&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | <details><summary>Expand...</summary> When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;resources.requests.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv015">https://avd.aquasec.com/appshield/ksv015</a><br></details> |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | <details><summary>Expand...</summary> When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;resources.requests.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv016">https://avd.aquasec.com/appshield/ksv016</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv017">https://avd.aquasec.com/appshield/ksv017</a><br></details> |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | <details><summary>Expand...</summary> Enforcing memory limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;resources.limits.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv018">https://avd.aquasec.com/appshield/ksv018</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-strapi&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;postgresql-init&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-strapi&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;postgresql-init&#39; of Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | <details><summary>Expand...</summary> HostPath volumes must be forbidden. <br> <hr> <br> Deployment &#39;RELEASE-NAME-strapi&#39; should not set &#39;spec.template.volumes.hostPath&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv023">https://avd.aquasec.com/appshield/ksv023</a><br></details> |
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> Deployment &#39;RELEASE-NAME-strapi&#39; should set &#39;spec.securityContext.runAsGroup&#39;, &#39;spec.securityContext.supplementalGroups[*]&#39; and &#39;spec.securityContext.fsGroup&#39; to integer greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv029">https://avd.aquasec.com/appshield/ksv029</a><br></details> |
## Containers
##### Detected Containers
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/postgresql:v14.2.0@sha256:f3be169e9257f6c516723874e8bed1e07f5af4ee555009fef6e481e740a4343b
tccr.io/truecharts/strapi:v3.6.8@sha256:25d345a1787c5be5ef1771b069e0eeaeba5b244a62870cc2b9d5acba0eaedd89
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/postgresql:v14.2.0@sha256:29d271601a53989aa4d6d0350f00ed36c7d20e920a9c744d6c01b81aee6638a1
##### Scan Results
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/postgresql:v14.2.0@sha256:f3be169e9257f6c516723874e8bed1e07f5af4ee555009fef6e481e740a4343b (debian 10.12)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| bash | CVE-2019-18276 | LOW | 5.0-4 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html">http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18276">https://access.redhat.com/security/cve/CVE-2019-18276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a><br><a href="https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff">https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a><br><a href="https://linux.oracle.com/cve/CVE-2019-18276.html">https://linux.oracle.com/cve/CVE-2019-18276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1679.html">https://linux.oracle.com/errata/ELSA-2021-1679.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">https://nvd.nist.gov/vuln/detail/CVE-2019-18276</a><br><a href="https://security.gentoo.org/glsa/202105-34">https://security.gentoo.org/glsa/202105-34</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0003/">https://security.netapp.com/advisory/ntap-20200430-0003/</a><br><a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a><br></details> |
| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| coreutils | CVE-2016-2781 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| coreutils | CVE-2017-18018 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18018">https://access.redhat.com/security/cve/CVE-2017-18018</a><br></details> |
| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33560">https://access.redhat.com/security/cve/CVE-2021-33560</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href="https://dev.gnupg.org/T5305">https://dev.gnupg.org/T5305</a><br><a href="https://dev.gnupg.org/T5328">https://dev.gnupg.org/T5328</a><br><a href="https://dev.gnupg.org/T5466">https://dev.gnupg.org/T5466</a><br><a href="https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61">https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33560.html">https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4409.html">https://linux.oracle.com/errata/ELSA-2021-4409.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">https://nvd.nist.gov/vuln/detail/CVE-2021-33560</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/10/02/2">http://www.openwall.com/lists/oss-security/2019/10/02/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13627">https://access.redhat.com/security/cve/CVE-2019-13627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</a><br><a href="https://dev.gnupg.org/T4683">https://dev.gnupg.org/T4683</a><br><a href="https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5">https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13627.html">https://linux.oracle.com/cve/CVE-2019-13627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4482.html">https://linux.oracle.com/errata/ELSA-2020-4482.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html</a><br><a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">https://security-tracker.debian.org/tracker/CVE-2019-13627</a><br><a href="https://security.gentoo.org/glsa/202003-32">https://security.gentoo.org/glsa/202003-32</a><br><a href="https://ubuntu.com/security/notices/USN-4236-1">https://ubuntu.com/security/notices/USN-4236-1</a><br><a href="https://ubuntu.com/security/notices/USN-4236-2">https://ubuntu.com/security/notices/USN-4236-2</a><br><a href="https://ubuntu.com/security/notices/USN-4236-3">https://ubuntu.com/security/notices/USN-4236-3</a><br><a href="https://usn.ubuntu.com/4236-1/">https://usn.ubuntu.com/4236-1/</a><br><a href="https://usn.ubuntu.com/4236-2/">https://usn.ubuntu.com/4236-2/</a><br><a href="https://usn.ubuntu.com/4236-3/">https://usn.ubuntu.com/4236-3/</a><br></details> |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6829">https://access.redhat.com/security/cve/CVE-2018-6829</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a><br><a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4209">https://access.redhat.com/security/cve/CVE-2021-4209</a><br></details> |
| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a><br><a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a><br><a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a><br><a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a><br><a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a><br><a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a><br><a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a><br><a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a><br><a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a><br><a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a><br><a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a><br><a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a><br><a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a><br><a href="http://osvdb.org/74829">http://osvdb.org/74829</a><br><a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a><br><a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a><br><a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a><br><a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a><br><a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a><br><a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a><br><a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a><br><a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a><br><a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a><br><a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a><br><a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a><br><a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a><br><a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a><br><a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a><br><a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a><br><a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a><br><a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a><br><a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a><br><a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a><br><a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a><br><a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a><br><a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a><br><a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a><br><a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a><br><a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a><br><a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a><br><a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a><br><a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a><br><a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a><br><a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a><br><a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a><br><a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a><br><a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a><br><a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a><br><a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a><br><a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a><br><a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-3389">https://access.redhat.com/security/cve/CVE-2011-3389</a><br><a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a><br><a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a><br><a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a><br><a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a><br><a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a><br><a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a><br><a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a><br></details> |
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290</a><br><a href="https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5">https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5</a><br><a href="https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de">https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de</a><br><a href="https://gitlab.com/libidn/libidn2/merge_requests/71">https://gitlab.com/libidn/libidn2/merge_requests/71</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/</a><br><a href="https://security.gentoo.org/glsa/202003-63">https://security.gentoo.org/glsa/202003-63</a><br><a href="https://ubuntu.com/security/notices/USN-4168-1">https://ubuntu.com/security/notices/USN-4168-1</a><br><a href="https://usn.ubuntu.com/4168-1/">https://usn.ubuntu.com/4168-1/</a><br></details> |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br></details> |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br></details> |
| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17543">https://access.redhat.com/security/cve/CVE-2019-17543</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a><br><a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a><br><a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a><br><a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a><br><a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a><br><a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11080">https://access.redhat.com/security/cve/CVE-2020-11080</a><br><a href="https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090">https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090</a><br><a href="https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394">https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394</a><br><a href="https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr">https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11080.html">https://linux.oracle.com/cve/CVE-2020-11080.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5765.html">https://linux.oracle.com/errata/ELSA-2020-5765.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">https://nvd.nist.gov/vuln/detail/CVE-2020-11080</a><br><a href="https://www.debian.org/security/2020/dsa-4696">https://www.debian.org/security/2020/dsa-4696</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html</a><br><a href="http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html">http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3624">https://access.redhat.com/errata/RHSA-2019:3624</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9893">https://access.redhat.com/security/cve/CVE-2019-9893</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893</a><br><a href="https://github.com/seccomp/libseccomp/issues/139">https://github.com/seccomp/libseccomp/issues/139</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9893.html">https://linux.oracle.com/cve/CVE-2019-9893.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3624.html">https://linux.oracle.com/errata/ELSA-2019-3624.html</a><br><a href="https://seclists.org/oss-sec/2019/q1/179">https://seclists.org/oss-sec/2019/q1/179</a><br><a href="https://security.gentoo.org/glsa/201904-18">https://security.gentoo.org/glsa/201904-18</a><br><a href="https://ubuntu.com/security/notices/USN-4001-1">https://ubuntu.com/security/notices/USN-4001-1</a><br><a href="https://ubuntu.com/security/notices/USN-4001-2">https://ubuntu.com/security/notices/USN-4001-2</a><br><a href="https://usn.ubuntu.com/4001-1/">https://usn.ubuntu.com/4001-1/</a><br><a href="https://usn.ubuntu.com/4001-2/">https://usn.ubuntu.com/4001-2/</a><br><a href="https://www.openwall.com/lists/oss-security/2019/03/15/1">https://www.openwall.com/lists/oss-security/2019/03/15/1</a><br></details> |
| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36084">https://access.redhat.com/security/cve/CVE-2021-36084</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084</a><br><a href="https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3">https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36084.html">https://linux.oracle.com/cve/CVE-2021-36084.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36085">https://access.redhat.com/security/cve/CVE-2021-36085</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085</a><br><a href="https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba">https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36085.html">https://linux.oracle.com/cve/CVE-2021-36085.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36086">https://access.redhat.com/security/cve/CVE-2021-36086</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36086.html">https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36087">https://access.redhat.com/security/cve/CVE-2021-36087</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href="https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521">https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36087.html">https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br></details> |
| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19603">https://access.redhat.com/security/cve/CVE-2019-19603</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603</a><br><a href="https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13">https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19603.html">https://linux.oracle.com/cve/CVE-2019-19603.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4396.html">https://linux.oracle.com/errata/ELSA-2021-4396.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20191223-0001/">https://security.netapp.com/advisory/ntap-20191223-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.sqlite.org/">https://www.sqlite.org/</a><br></details> |
| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19645">https://access.redhat.com/security/cve/CVE-2019-19645</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645</a><br><a href="https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06">https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06</a><br><a href="https://security.netapp.com/advisory/ntap-20191223-0001/">https://security.netapp.com/advisory/ntap-20191223-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19924">https://access.redhat.com/security/cve/CVE-2019-19924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924</a><br><a href="https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3">https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19924.html">https://linux.oracle.com/cve/CVE-2019-19924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20200114-0003/">https://security.netapp.com/advisory/ntap-20200114-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4298-1">https://ubuntu.com/security/notices/USN-4298-1</a><br><a href="https://usn.ubuntu.com/4298-1/">https://usn.ubuntu.com/4298-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br></details> |
| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/19">http://seclists.org/fulldisclosure/2020/Nov/19</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/20">http://seclists.org/fulldisclosure/2020/Nov/20</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/22">http://seclists.org/fulldisclosure/2020/Nov/22</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13631">https://access.redhat.com/security/cve/CVE-2020-13631</a><br><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1080459">https://bugs.chromium.org/p/chromium/issues/detail?id=1080459</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13631.html">https://linux.oracle.com/cve/CVE-2020-13631.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4442.html">https://linux.oracle.com/errata/ELSA-2020-4442.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200608-0002/">https://security.netapp.com/advisory/ntap-20200608-0002/</a><br><a href="https://sqlite.org/src/info/eca0ba2cf4c0fdf7">https://sqlite.org/src/info/eca0ba2cf4c0fdf7</a><br><a href="https://support.apple.com/kb/HT211843">https://support.apple.com/kb/HT211843</a><br><a href="https://support.apple.com/kb/HT211844">https://support.apple.com/kb/HT211844</a><br><a href="https://support.apple.com/kb/HT211850">https://support.apple.com/kb/HT211850</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT211935">https://support.apple.com/kb/HT211935</a><br><a href="https://support.apple.com/kb/HT211952">https://support.apple.com/kb/HT211952</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45346">https://access.redhat.com/security/cve/CVE-2021-45346</a><br><a href="https://github.com/guyinatuxedo/sqlite3_record_leaking">https://github.com/guyinatuxedo/sqlite3_record_leaking</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0001/">https://security.netapp.com/advisory/ntap-20220303-0001/</a><br><a href="https://sqlite.org/forum/forumpost/53de8864ba114bf6">https://sqlite.org/forum/forumpost/53de8864ba114bf6</a><br></details> |
| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19244">https://access.redhat.com/security/cve/CVE-2019-19244</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244</a><br><a href="https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348">https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348</a><br><a href="https://ubuntu.com/security/notices/USN-4205-1">https://ubuntu.com/security/notices/USN-4205-1</a><br><a href="https://usn.ubuntu.com/4205-1/">https://usn.ubuntu.com/4205-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br></details> |
| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11656">https://access.redhat.com/security/cve/CVE-2020-11656</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.sqlite.org/src/info/d09f8c3621d5f7f8">https://www.sqlite.org/src/info/d09f8c3621d5f7f8</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br><a href="https://www3.sqlite.org/cgi/src/info/b64674919f673602">https://www3.sqlite.org/cgi/src/info/b64674919f673602</a><br></details> |
| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">https://nvd.nist.gov/vuln/detail/CVE-2021-36690</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.sqlite.org/forum/forumpost/718c0a8d17">https://www.sqlite.org/forum/forumpost/718c0a8d17</a><br></details> |
| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-13115">https://access.redhat.com/security/cve/CVE-2019-13115</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow/">https://blog.semmle.com/libssh2-integer-overflow/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115</a><br><a href="https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa">https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa</a><br><a href="https://github.com/libssh2/libssh2/pull/350">https://github.com/libssh2/libssh2/pull/350</a><br><a href="https://libssh2.org/changes.html">https://libssh2.org/changes.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0002/">https://security.netapp.com/advisory/ntap-20190806-0002/</a><br><a href="https://support.f5.com/csp/article/K13322484">https://support.f5.com/csp/article/K13322484</a><br><a href="https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17498">https://access.redhat.com/security/cve/CVE-2019-17498</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/">https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498</a><br><a href="https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498">https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498</a><br><a href="https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480">https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480</a><br><a href="https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c">https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c</a><br><a href="https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94">https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17498.html">https://linux.oracle.com/cve/CVE-2019-17498.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3915.html">https://linux.oracle.com/errata/ELSA-2020-3915.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">https://nvd.nist.gov/vuln/detail/CVE-2019-17498</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000654">https://access.redhat.com/security/cve/CVE-2018-1000654</a><br><a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u3 | | <details><summary>Expand...</summary><a href="http://xmlsoft.org/news.html">http://xmlsoft.org/news.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16932">https://access.redhat.com/security/cve/CVE-2017-16932</a><br><a href="https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html">https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=759579">https://bugzilla.gnome.org/show_bug.cgi?id=759579</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932</a><br><a href="https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961">https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961</a><br><a href="https://github.com/sparklemotion/nokogiri/issues/1714">https://github.com/sparklemotion/nokogiri/issues/1714</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html">https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html</a><br><a href="https://ubuntu.com/security/notices/USN-3504-1">https://ubuntu.com/security/notices/USN-3504-1</a><br><a href="https://ubuntu.com/security/notices/USN-3504-2">https://ubuntu.com/security/notices/USN-3504-2</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/usn/usn-3504-1/">https://usn.ubuntu.com/usn/usn-3504-1/</a><br></details> |
| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94347">http://www.securityfocus.com/bid/94347</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9318">https://access.redhat.com/security/cve/CVE-2016-9318</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=772726">https://bugzilla.gnome.org/show_bug.cgi?id=772726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318</a><br><a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://ubuntu.com/security/notices/USN-3739-2">https://ubuntu.com/security/notices/USN-3739-2</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a><br></details> |
| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2015-9019">https://access.redhat.com/security/cve/CVE-2015-9019</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=758400">https://bugzilla.gnome.org/show_bug.cgi?id=758400</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=934119">https://bugzilla.suse.com/show_bug.cgi?id=934119</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019</a><br></details> |
| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| locales | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c">https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a><br><a href="https://access.redhat.com/security/cve/CVE-2005-2541">https://access.redhat.com/security/cve/CVE-2005-2541</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br></details> |
| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a><br><a href="http://savannah.gnu.org/bugs/?55369">http://savannah.gnu.org/bugs/?55369</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9923">https://access.redhat.com/security/cve/CVE-2019-9923</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241">https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a><br></details> |
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20193">https://access.redhat.com/security/cve/CVE-2021-20193</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
**jar**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43784">https://access.redhat.com/security/cve/CVE-2021-43784</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2241">https://bugs.chromium.org/p/project-zero/issues/detail?id=2241</a><br><a href="https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554">https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554</a><br><a href="https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae">https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae</a><br><a href="https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed">https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f">https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">https://nvd.nist.gov/vuln/detail/CVE-2021-43784</a><br></details> |
#### Container: tccr.io/truecharts/strapi:v3.6.8@sha256:25d345a1787c5be5ef1771b069e0eeaeba5b244a62870cc2b9d5acba0eaedd89 (debian 9.13)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 1.4.11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| apt-transport-https | CVE-2011-3374 | LOW | 1.4.11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| bash | CVE-2019-18276 | LOW | 4.4-5 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html">http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18276">https://access.redhat.com/security/cve/CVE-2019-18276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a><br><a href="https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff">https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a><br><a href="https://linux.oracle.com/cve/CVE-2019-18276.html">https://linux.oracle.com/cve/CVE-2019-18276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1679.html">https://linux.oracle.com/errata/ELSA-2021-1679.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">https://nvd.nist.gov/vuln/detail/CVE-2019-18276</a><br><a href="https://security.gentoo.org/glsa/202105-34">https://security.gentoo.org/glsa/202105-34</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0003/">https://security.netapp.com/advisory/ntap-20200430-0003/</a><br><a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a><br></details> |
| binutils | CVE-2017-12448 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12448">https://access.redhat.com/security/cve/CVE-2017-12448</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21787">https://sourceware.org/bugzilla/show_bug.cgi?id=21787</a><br></details> |
| binutils | CVE-2017-12449 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12449">https://access.redhat.com/security/cve/CVE-2017-12449</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21840">https://sourceware.org/bugzilla/show_bug.cgi?id=21840</a><br></details> |
| binutils | CVE-2017-12450 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12450">https://access.redhat.com/security/cve/CVE-2017-12450</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21813">https://sourceware.org/bugzilla/show_bug.cgi?id=21813</a><br></details> |
| binutils | CVE-2017-12451 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12451">https://access.redhat.com/security/cve/CVE-2017-12451</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21786">https://sourceware.org/bugzilla/show_bug.cgi?id=21786</a><br></details> |
| binutils | CVE-2017-12452 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12452">https://access.redhat.com/security/cve/CVE-2017-12452</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21813">https://sourceware.org/bugzilla/show_bug.cgi?id=21813</a><br></details> |
| binutils | CVE-2017-12453 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12453">https://access.redhat.com/security/cve/CVE-2017-12453</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21813">https://sourceware.org/bugzilla/show_bug.cgi?id=21813</a><br></details> |
| binutils | CVE-2017-12454 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12454">https://access.redhat.com/security/cve/CVE-2017-12454</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21813">https://sourceware.org/bugzilla/show_bug.cgi?id=21813</a><br></details> |
| binutils | CVE-2017-12455 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12455">https://access.redhat.com/security/cve/CVE-2017-12455</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21840">https://sourceware.org/bugzilla/show_bug.cgi?id=21840</a><br></details> |
| binutils | CVE-2017-12456 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12456">https://access.redhat.com/security/cve/CVE-2017-12456</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21813">https://sourceware.org/bugzilla/show_bug.cgi?id=21813</a><br></details> |
| binutils | CVE-2017-12457 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12457">https://access.redhat.com/security/cve/CVE-2017-12457</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21840">https://sourceware.org/bugzilla/show_bug.cgi?id=21840</a><br></details> |
| binutils | CVE-2017-12458 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12458">https://access.redhat.com/security/cve/CVE-2017-12458</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21840">https://sourceware.org/bugzilla/show_bug.cgi?id=21840</a><br></details> |
| binutils | CVE-2017-12459 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12459">https://access.redhat.com/security/cve/CVE-2017-12459</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21840">https://sourceware.org/bugzilla/show_bug.cgi?id=21840</a><br></details> |
| binutils | CVE-2017-12799 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100292">http://www.securityfocus.com/bid/100292</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12799">https://access.redhat.com/security/cve/CVE-2017-12799</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21933">https://sourceware.org/bugzilla/show_bug.cgi?id=21933</a><br></details> |
| binutils | CVE-2017-13710 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100499">http://www.securityfocus.com/bid/100499</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13710">https://access.redhat.com/security/cve/CVE-2017-13710</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b</a><br></details> |
| binutils | CVE-2017-14333 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14333">https://access.redhat.com/security/cve/CVE-2017-14333</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21990">https://sourceware.org/bugzilla/show_bug.cgi?id=21990</a><br></details> |
| binutils | CVE-2017-14729 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14729">https://access.redhat.com/security/cve/CVE-2017-14729</a><br><a href="https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/">https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22170">https://sourceware.org/bugzilla/show_bug.cgi?id=22170</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360</a><br></details> |
| binutils | CVE-2017-14745 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14745">https://access.redhat.com/security/cve/CVE-2017-14745</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22148">https://sourceware.org/bugzilla/show_bug.cgi?id=22148</a><br></details> |
| binutils | CVE-2018-6323 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/102821">http://www.securityfocus.com/bid/102821</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6323">https://access.redhat.com/security/cve/CVE-2018-6323</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22746">https://sourceware.org/bugzilla/show_bug.cgi?id=22746</a><br><a href="https://www.exploit-db.com/exploits/44035/">https://www.exploit-db.com/exploits/44035/</a><br></details> |
| binutils | CVE-2018-6543 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/102985">http://www.securityfocus.com/bid/102985</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6543">https://access.redhat.com/security/cve/CVE-2018-6543</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22769">https://sourceware.org/bugzilla/show_bug.cgi?id=22769</a><br></details> |
| binutils | CVE-2018-7208 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/103077">http://www.securityfocus.com/bid/103077</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7208">https://access.redhat.com/security/cve/CVE-2018-7208</a><br><a href="https://linux.oracle.com/cve/CVE-2018-7208.html">https://linux.oracle.com/cve/CVE-2018-7208.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22741">https://sourceware.org/bugzilla/show_bug.cgi?id=22741</a><br></details> |
| binutils | CVE-2018-7643 | HIGH | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/103264">http://www.securityfocus.com/bid/103264</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7643">https://access.redhat.com/security/cve/CVE-2018-7643</a><br><a href="https://linux.oracle.com/cve/CVE-2018-7643.html">https://linux.oracle.com/cve/CVE-2018-7643.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22905">https://sourceware.org/bugzilla/show_bug.cgi?id=22905</a><br></details> |
| binutils | CVE-2017-12967 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100462">http://www.securityfocus.com/bid/100462</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12967">https://access.redhat.com/security/cve/CVE-2017-12967</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21962">https://sourceware.org/bugzilla/show_bug.cgi?id=21962</a><br></details> |
| binutils | CVE-2017-13757 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100532">http://www.securityfocus.com/bid/100532</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13757">https://access.redhat.com/security/cve/CVE-2017-13757</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22018">https://sourceware.org/bugzilla/show_bug.cgi?id=22018</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a</a><br></details> |
| binutils | CVE-2017-14529 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14529">https://access.redhat.com/security/cve/CVE-2017-14529</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22113">https://sourceware.org/bugzilla/show_bug.cgi?id=22113</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582</a><br></details> |
| binutils | CVE-2017-14974 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14974">https://access.redhat.com/security/cve/CVE-2017-14974</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22163">https://sourceware.org/bugzilla/show_bug.cgi?id=22163</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf</a><br></details> |
| binutils | CVE-2017-9954 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99307">http://www.securityfocus.com/bid/99307</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9954">https://access.redhat.com/security/cve/CVE-2017-9954</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21670">https://sourceware.org/bugzilla/show_bug.cgi?id=21670</a><br></details> |
| binutils | CVE-2017-9955 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99573">http://www.securityfocus.com/bid/99573</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9955">https://access.redhat.com/security/cve/CVE-2017-9955</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21665">https://sourceware.org/bugzilla/show_bug.cgi?id=21665</a><br></details> |
| binutils | CVE-2018-10372 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103976">http://www.securityfocus.com/bid/103976</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10372">https://access.redhat.com/security/cve/CVE-2018-10372</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10372.html">https://linux.oracle.com/cve/CVE-2018-10372.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23064">https://sourceware.org/bugzilla/show_bug.cgi?id=23064</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-10373 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104000">http://www.securityfocus.com/bid/104000</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10373">https://access.redhat.com/security/cve/CVE-2018-10373</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10373.html">https://linux.oracle.com/cve/CVE-2018-10373.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23065">https://sourceware.org/bugzilla/show_bug.cgi?id=23065</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-10534 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104025">http://www.securityfocus.com/bid/104025</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10534">https://access.redhat.com/security/cve/CVE-2018-10534</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10534.html">https://linux.oracle.com/cve/CVE-2018-10534.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23110">https://sourceware.org/bugzilla/show_bug.cgi?id=23110</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-10535 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104021">http://www.securityfocus.com/bid/104021</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10535">https://access.redhat.com/security/cve/CVE-2018-10535</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10535.html">https://linux.oracle.com/cve/CVE-2018-10535.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23113">https://sourceware.org/bugzilla/show_bug.cgi?id=23113</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-6759 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/103030">http://www.securityfocus.com/bid/103030</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6759">https://access.redhat.com/security/cve/CVE-2018-6759</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22794">https://sourceware.org/bugzilla/show_bug.cgi?id=22794</a><br></details> |
| binutils | CVE-2018-6872 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/103103">http://www.securityfocus.com/bid/103103</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6872">https://access.redhat.com/security/cve/CVE-2018-6872</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22788">https://sourceware.org/bugzilla/show_bug.cgi?id=22788</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6</a><br></details> |
| binutils | CVE-2018-7568 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7568">https://access.redhat.com/security/cve/CVE-2018-7568</a><br><a href="https://linux.oracle.com/cve/CVE-2018-7568.html">https://linux.oracle.com/cve/CVE-2018-7568.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22894">https://sourceware.org/bugzilla/show_bug.cgi?id=22894</a><br></details> |
| binutils | CVE-2018-7569 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7569">https://access.redhat.com/security/cve/CVE-2018-7569</a><br><a href="https://linux.oracle.com/cve/CVE-2018-7569.html">https://linux.oracle.com/cve/CVE-2018-7569.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22895">https://sourceware.org/bugzilla/show_bug.cgi?id=22895</a><br></details> |
| binutils | CVE-2018-7570 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7570">https://access.redhat.com/security/cve/CVE-2018-7570</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22881">https://sourceware.org/bugzilla/show_bug.cgi?id=22881</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=01f7e10cf2dcf403462b2feed06c43135651556d">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=01f7e10cf2dcf403462b2feed06c43135651556d</a><br></details> |
| binutils | CVE-2018-7642 | MEDIUM | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7642">https://access.redhat.com/security/cve/CVE-2018-7642</a><br><a href="https://linux.oracle.com/cve/CVE-2018-7642.html">https://linux.oracle.com/cve/CVE-2018-7642.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22887">https://sourceware.org/bugzilla/show_bug.cgi?id=22887</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25</a><br></details> |
| binutils | CVE-2017-13716 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13716">https://access.redhat.com/security/cve/CVE-2017-13716</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details> |
| binutils | CVE-2017-14128 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100623">http://www.securityfocus.com/bid/100623</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14128">https://access.redhat.com/security/cve/CVE-2017-14128</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22059">https://sourceware.org/bugzilla/show_bug.cgi?id=22059</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780</a><br></details> |
| binutils | CVE-2017-14129 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100624">http://www.securityfocus.com/bid/100624</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14129">https://access.redhat.com/security/cve/CVE-2017-14129</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22047">https://sourceware.org/bugzilla/show_bug.cgi?id=22047</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643</a><br></details> |
| binutils | CVE-2017-14130 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100625">http://www.securityfocus.com/bid/100625</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14130">https://access.redhat.com/security/cve/CVE-2017-14130</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22058">https://sourceware.org/bugzilla/show_bug.cgi?id=22058</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229</a><br></details> |
| binutils | CVE-2017-14930 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14930">https://access.redhat.com/security/cve/CVE-2017-14930</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22191">https://sourceware.org/bugzilla/show_bug.cgi?id=22191</a><br></details> |
| binutils | CVE-2017-14932 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14932">https://access.redhat.com/security/cve/CVE-2017-14932</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22204">https://sourceware.org/bugzilla/show_bug.cgi?id=22204</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005</a><br></details> |
| binutils | CVE-2017-14933 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101203">http://www.securityfocus.com/bid/101203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14933">https://access.redhat.com/security/cve/CVE-2017-14933</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22210">https://sourceware.org/bugzilla/show_bug.cgi?id=22210</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32</a><br></details> |
| binutils | CVE-2017-14934 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101204">http://www.securityfocus.com/bid/101204</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14934">https://access.redhat.com/security/cve/CVE-2017-14934</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22219">https://sourceware.org/bugzilla/show_bug.cgi?id=22219</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b</a><br></details> |
| binutils | CVE-2017-14938 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101212">http://www.securityfocus.com/bid/101212</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14938">https://access.redhat.com/security/cve/CVE-2017-14938</a><br><a href="https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/">https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22166">https://sourceware.org/bugzilla/show_bug.cgi?id=22166</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6</a><br></details> |
| binutils | CVE-2017-14939 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101216">http://www.securityfocus.com/bid/101216</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14939">https://access.redhat.com/security/cve/CVE-2017-14939</a><br><a href="https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/">https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22169">https://sourceware.org/bugzilla/show_bug.cgi?id=22169</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724</a><br><a href="https://www.exploit-db.com/exploits/42970/">https://www.exploit-db.com/exploits/42970/</a><br></details> |
| binutils | CVE-2017-14940 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14940">https://access.redhat.com/security/cve/CVE-2017-14940</a><br><a href="https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/">https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22166">https://sourceware.org/bugzilla/show_bug.cgi?id=22166</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe</a><br></details> |
| binutils | CVE-2017-15020 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15020">https://access.redhat.com/security/cve/CVE-2017-15020</a><br><a href="https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/">https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22202">https://sourceware.org/bugzilla/show_bug.cgi?id=22202</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5</a><br></details> |
| binutils | CVE-2017-15021 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15021">https://access.redhat.com/security/cve/CVE-2017-15021</a><br><a href="https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/">https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22197">https://sourceware.org/bugzilla/show_bug.cgi?id=22197</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d</a><br></details> |
| binutils | CVE-2017-15022 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15022">https://access.redhat.com/security/cve/CVE-2017-15022</a><br><a href="https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/">https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22201">https://sourceware.org/bugzilla/show_bug.cgi?id=22201</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8</a><br></details> |
| binutils | CVE-2017-15023 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101611">http://www.securityfocus.com/bid/101611</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15023">https://access.redhat.com/security/cve/CVE-2017-15023</a><br><a href="https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/">https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22200">https://sourceware.org/bugzilla/show_bug.cgi?id=22200</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf</a><br></details> |
| binutils | CVE-2017-15024 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15024">https://access.redhat.com/security/cve/CVE-2017-15024</a><br><a href="https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/">https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22187">https://sourceware.org/bugzilla/show_bug.cgi?id=22187</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2</a><br></details> |
| binutils | CVE-2017-15025 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15025">https://access.redhat.com/security/cve/CVE-2017-15025</a><br><a href="https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/">https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22186">https://sourceware.org/bugzilla/show_bug.cgi?id=22186</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48</a><br></details> |
| binutils | CVE-2017-15225 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15225">https://access.redhat.com/security/cve/CVE-2017-15225</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22212">https://sourceware.org/bugzilla/show_bug.cgi?id=22212</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0</a><br></details> |
| binutils | CVE-2017-15938 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101610">http://www.securityfocus.com/bid/101610</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15938">https://access.redhat.com/security/cve/CVE-2017-15938</a><br><a href="https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/">https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22209">https://sourceware.org/bugzilla/show_bug.cgi?id=22209</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a</a><br></details> |
| binutils | CVE-2017-15996 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101608">http://www.securityfocus.com/bid/101608</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15996">https://access.redhat.com/security/cve/CVE-2017-15996</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22361">https://sourceware.org/bugzilla/show_bug.cgi?id=22361</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b</a><br></details> |
| binutils | CVE-2017-16826 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-16826">https://access.redhat.com/security/cve/CVE-2017-16826</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22376">https://sourceware.org/bugzilla/show_bug.cgi?id=22376</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d</a><br></details> |
| binutils | CVE-2017-16827 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-16827">https://access.redhat.com/security/cve/CVE-2017-16827</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22306">https://sourceware.org/bugzilla/show_bug.cgi?id=22306</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419</a><br></details> |
| binutils | CVE-2017-16828 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-16828">https://access.redhat.com/security/cve/CVE-2017-16828</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22386">https://sourceware.org/bugzilla/show_bug.cgi?id=22386</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d</a><br></details> |
| binutils | CVE-2017-16829 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-16829">https://access.redhat.com/security/cve/CVE-2017-16829</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22307">https://sourceware.org/bugzilla/show_bug.cgi?id=22307</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163</a><br></details> |
| binutils | CVE-2017-16830 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101941">http://www.securityfocus.com/bid/101941</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16830">https://access.redhat.com/security/cve/CVE-2017-16830</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22384">https://sourceware.org/bugzilla/show_bug.cgi?id=22384</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4</a><br></details> |
| binutils | CVE-2017-16831 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-16831">https://access.redhat.com/security/cve/CVE-2017-16831</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22385">https://sourceware.org/bugzilla/show_bug.cgi?id=22385</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca</a><br></details> |
| binutils | CVE-2017-16832 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-16832">https://access.redhat.com/security/cve/CVE-2017-16832</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22373">https://sourceware.org/bugzilla/show_bug.cgi?id=22373</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b</a><br></details> |
| binutils | CVE-2017-17080 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17080">https://access.redhat.com/security/cve/CVE-2017-17080</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22421">https://sourceware.org/bugzilla/show_bug.cgi?id=22421</a><br></details> |
| binutils | CVE-2017-17121 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17121">https://access.redhat.com/security/cve/CVE-2017-17121</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22506">https://sourceware.org/bugzilla/show_bug.cgi?id=22506</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b</a><br></details> |
| binutils | CVE-2017-17122 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17122">https://access.redhat.com/security/cve/CVE-2017-17122</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22508">https://sourceware.org/bugzilla/show_bug.cgi?id=22508</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f</a><br></details> |
| binutils | CVE-2017-17123 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17123">https://access.redhat.com/security/cve/CVE-2017-17123</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22509">https://sourceware.org/bugzilla/show_bug.cgi?id=22509</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543</a><br></details> |
| binutils | CVE-2017-17124 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17124">https://access.redhat.com/security/cve/CVE-2017-17124</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22507">https://sourceware.org/bugzilla/show_bug.cgi?id=22507</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c</a><br></details> |
| binutils | CVE-2017-17125 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17125">https://access.redhat.com/security/cve/CVE-2017-17125</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22443">https://sourceware.org/bugzilla/show_bug.cgi?id=22443</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4</a><br></details> |
| binutils | CVE-2017-17126 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17126">https://access.redhat.com/security/cve/CVE-2017-17126</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22510">https://sourceware.org/bugzilla/show_bug.cgi?id=22510</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8</a><br></details> |
| binutils | CVE-2017-9038 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98589">http://www.securityfocus.com/bid/98589</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9038">https://access.redhat.com/security/cve/CVE-2017-9038</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d</a><br></details> |
| binutils | CVE-2017-9039 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98580">http://www.securityfocus.com/bid/98580</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9039">https://access.redhat.com/security/cve/CVE-2017-9039</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5</a><br></details> |
| binutils | CVE-2017-9040 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98579">http://www.securityfocus.com/bid/98579</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9040">https://access.redhat.com/security/cve/CVE-2017-9040</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf</a><br></details> |
| binutils | CVE-2017-9041 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98598">http://www.securityfocus.com/bid/98598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9041">https://access.redhat.com/security/cve/CVE-2017-9041</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3</a><br></details> |
| binutils | CVE-2017-9042 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-9042">https://access.redhat.com/security/cve/CVE-2017-9042</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf</a><br></details> |
| binutils | CVE-2017-9043 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98591">http://www.securityfocus.com/bid/98591</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9043">https://access.redhat.com/security/cve/CVE-2017-9043</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54</a><br></details> |
| binutils | CVE-2017-9044 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98587">http://www.securityfocus.com/bid/98587</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9044">https://access.redhat.com/security/cve/CVE-2017-9044</a><br><a href="https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/">https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/</a><br></details> |
| binutils | CVE-2017-9742 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99105">http://www.securityfocus.com/bid/99105</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9742">https://access.redhat.com/security/cve/CVE-2017-9742</a><br><a href="https://security.gentoo.org/glsa/201709-02">https://security.gentoo.org/glsa/201709-02</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21576">https://sourceware.org/bugzilla/show_bug.cgi?id=21576</a><br><a href="https://www.exploit-db.com/exploits/42203/">https://www.exploit-db.com/exploits/42203/</a><br></details> |
| binutils | CVE-2017-9743 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99106">http://www.securityfocus.com/bid/99106</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9743">https://access.redhat.com/security/cve/CVE-2017-9743</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21577">https://sourceware.org/bugzilla/show_bug.cgi?id=21577</a><br></details> |
| binutils | CVE-2017-9744 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99108">http://www.securityfocus.com/bid/99108</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9744">https://access.redhat.com/security/cve/CVE-2017-9744</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21578">https://sourceware.org/bugzilla/show_bug.cgi?id=21578</a><br></details> |
| binutils | CVE-2017-9745 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99109">http://www.securityfocus.com/bid/99109</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9745">https://access.redhat.com/security/cve/CVE-2017-9745</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21579">https://sourceware.org/bugzilla/show_bug.cgi?id=21579</a><br></details> |
| binutils | CVE-2017-9746 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99117">http://www.securityfocus.com/bid/99117</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9746">https://access.redhat.com/security/cve/CVE-2017-9746</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21580">https://sourceware.org/bugzilla/show_bug.cgi?id=21580</a><br><a href="https://www.exploit-db.com/exploits/42199/">https://www.exploit-db.com/exploits/42199/</a><br></details> |
| binutils | CVE-2017-9747 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99114">http://www.securityfocus.com/bid/99114</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9747">https://access.redhat.com/security/cve/CVE-2017-9747</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21581">https://sourceware.org/bugzilla/show_bug.cgi?id=21581</a><br><a href="https://www.exploit-db.com/exploits/42200/">https://www.exploit-db.com/exploits/42200/</a><br></details> |
| binutils | CVE-2017-9748 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99110">http://www.securityfocus.com/bid/99110</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9748">https://access.redhat.com/security/cve/CVE-2017-9748</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21582">https://sourceware.org/bugzilla/show_bug.cgi?id=21582</a><br><a href="https://www.exploit-db.com/exploits/42202/">https://www.exploit-db.com/exploits/42202/</a><br></details> |
| binutils | CVE-2017-9749 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99113">http://www.securityfocus.com/bid/99113</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9749">https://access.redhat.com/security/cve/CVE-2017-9749</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21586">https://sourceware.org/bugzilla/show_bug.cgi?id=21586</a><br><a href="https://www.exploit-db.com/exploits/42201/">https://www.exploit-db.com/exploits/42201/</a><br></details> |
| binutils | CVE-2017-9750 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99118">http://www.securityfocus.com/bid/99118</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9750">https://access.redhat.com/security/cve/CVE-2017-9750</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21587">https://sourceware.org/bugzilla/show_bug.cgi?id=21587</a><br><a href="https://www.exploit-db.com/exploits/42198/">https://www.exploit-db.com/exploits/42198/</a><br></details> |
| binutils | CVE-2017-9751 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99111">http://www.securityfocus.com/bid/99111</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9751">https://access.redhat.com/security/cve/CVE-2017-9751</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21588">https://sourceware.org/bugzilla/show_bug.cgi?id=21588</a><br></details> |
| binutils | CVE-2017-9752 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99122">http://www.securityfocus.com/bid/99122</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9752">https://access.redhat.com/security/cve/CVE-2017-9752</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21589">https://sourceware.org/bugzilla/show_bug.cgi?id=21589</a><br></details> |
| binutils | CVE-2017-9753 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99116">http://www.securityfocus.com/bid/99116</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9753">https://access.redhat.com/security/cve/CVE-2017-9753</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21591">https://sourceware.org/bugzilla/show_bug.cgi?id=21591</a><br></details> |
| binutils | CVE-2017-9754 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99125">http://www.securityfocus.com/bid/99125</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9754">https://access.redhat.com/security/cve/CVE-2017-9754</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21591">https://sourceware.org/bugzilla/show_bug.cgi?id=21591</a><br></details> |
| binutils | CVE-2017-9755 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99124">http://www.securityfocus.com/bid/99124</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9755">https://access.redhat.com/security/cve/CVE-2017-9755</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21594">https://sourceware.org/bugzilla/show_bug.cgi?id=21594</a><br></details> |
| binutils | CVE-2017-9756 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99103">http://www.securityfocus.com/bid/99103</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9756">https://access.redhat.com/security/cve/CVE-2017-9756</a><br><a href="https://security.gentoo.org/glsa/201801-01">https://security.gentoo.org/glsa/201801-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21595">https://sourceware.org/bugzilla/show_bug.cgi?id=21595</a><br><a href="https://www.exploit-db.com/exploits/42204/">https://www.exploit-db.com/exploits/42204/</a><br></details> |
| binutils | CVE-2018-1000876 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/106304">http://www.securityfocus.com/bid/106304</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2075">https://access.redhat.com/errata/RHSA-2019:2075</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000876">https://access.redhat.com/security/cve/CVE-2018-1000876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876</a><br><a href="https://linux.oracle.com/cve/CVE-2018-1000876.html">https://linux.oracle.com/cve/CVE-2018-1000876.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2075.html">https://linux.oracle.com/errata/ELSA-2019-2075.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23994">https://sourceware.org/bugzilla/show_bug.cgi?id=23994</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-12697 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104538">http://www.securityfocus.com/bid/104538</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2075">https://access.redhat.com/errata/RHSA-2019:2075</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12697">https://access.redhat.com/security/cve/CVE-2018-12697</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102">https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454</a><br><a href="https://linux.oracle.com/cve/CVE-2018-12697.html">https://linux.oracle.com/cve/CVE-2018-12697.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2075.html">https://linux.oracle.com/errata/ELSA-2019-2075.html</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23057">https://sourceware.org/bugzilla/show_bug.cgi?id=23057</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-12698 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104539">http://www.securityfocus.com/bid/104539</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12698">https://access.redhat.com/security/cve/CVE-2018-12698</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102">https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23057">https://sourceware.org/bugzilla/show_bug.cgi?id=23057</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-12699 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104540">http://www.securityfocus.com/bid/104540</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12699">https://access.redhat.com/security/cve/CVE-2018-12699</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102">https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23057">https://sourceware.org/bugzilla/show_bug.cgi?id=23057</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-12934 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12934">https://access.redhat.com/security/cve/CVE-2018-12934</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101">https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23059">https://sourceware.org/bugzilla/show_bug.cgi?id=23059</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-13033 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104584">http://www.securityfocus.com/bid/104584</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13033">https://access.redhat.com/security/cve/CVE-2018-13033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13033.html">https://linux.oracle.com/cve/CVE-2018-13033.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23361">https://sourceware.org/bugzilla/show_bug.cgi?id=23361</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-17358 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-17358">https://access.redhat.com/security/cve/CVE-2018-17358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358</a><br><a href="https://seclists.org/bugtraq/2020/Jan/25">https://seclists.org/bugtraq/2020/Jan/25</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23686">https://sourceware.org/bugzilla/show_bug.cgi?id=23686</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-17359 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-17359">https://access.redhat.com/security/cve/CVE-2018-17359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23686">https://sourceware.org/bugzilla/show_bug.cgi?id=23686</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-17360 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-17360">https://access.redhat.com/security/cve/CVE-2018-17360</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23685">https://sourceware.org/bugzilla/show_bug.cgi?id=23685</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-17794 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17794">https://access.redhat.com/security/cve/CVE-2018-17794</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-17985 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-17985">https://access.redhat.com/security/cve/CVE-2018-17985</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18309 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/105692">http://www.securityfocus.com/bid/105692</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18309">https://access.redhat.com/security/cve/CVE-2018-18309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23770">https://sourceware.org/bugzilla/show_bug.cgi?id=23770</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18483 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/105689">http://www.securityfocus.com/bid/105689</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18483">https://access.redhat.com/security/cve/CVE-2018-18483</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23767">https://sourceware.org/bugzilla/show_bug.cgi?id=23767</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18484 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/105693">http://www.securityfocus.com/bid/105693</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18484">https://access.redhat.com/security/cve/CVE-2018-18484</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18605 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/105754">http://www.securityfocus.com/bid/105754</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18605">https://access.redhat.com/security/cve/CVE-2018-18605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605</a><br><a href="https://security.netapp.com/advisory/ntap-20190307-0003/">https://security.netapp.com/advisory/ntap-20190307-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23804">https://sourceware.org/bugzilla/show_bug.cgi?id=23804</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18606 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/105754">http://www.securityfocus.com/bid/105754</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18606">https://access.redhat.com/security/cve/CVE-2018-18606</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606</a><br><a href="https://security.netapp.com/advisory/ntap-20190307-0003/">https://security.netapp.com/advisory/ntap-20190307-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23806">https://sourceware.org/bugzilla/show_bug.cgi?id=23806</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18607 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/105754">http://www.securityfocus.com/bid/105754</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18607">https://access.redhat.com/security/cve/CVE-2018-18607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607</a><br><a href="https://security.netapp.com/advisory/ntap-20190307-0003/">https://security.netapp.com/advisory/ntap-20190307-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23805">https://sourceware.org/bugzilla/show_bug.cgi?id=23805</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18700 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18700">https://access.redhat.com/security/cve/CVE-2018-18700</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-18701 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18701">https://access.redhat.com/security/cve/CVE-2018-18701</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-19931 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/106144">http://www.securityfocus.com/bid/106144</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-19931">https://access.redhat.com/security/cve/CVE-2018-19931</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://security.netapp.com/advisory/ntap-20190221-0004/">https://security.netapp.com/advisory/ntap-20190221-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23942">https://sourceware.org/bugzilla/show_bug.cgi?id=23942</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-19932 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/106144">http://www.securityfocus.com/bid/106144</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-19932">https://access.redhat.com/security/cve/CVE-2018-19932</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://security.netapp.com/advisory/ntap-20190221-0004/">https://security.netapp.com/advisory/ntap-20190221-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23932">https://sourceware.org/bugzilla/show_bug.cgi?id=23932</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-20002 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106142">http://www.securityfocus.com/bid/106142</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20002">https://access.redhat.com/security/cve/CVE-2018-20002</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://security.netapp.com/advisory/ntap-20190221-0004/">https://security.netapp.com/advisory/ntap-20190221-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23952">https://sourceware.org/bugzilla/show_bug.cgi?id=23952</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9</a><br><a href="https://support.f5.com/csp/article/K62602089">https://support.f5.com/csp/article/K62602089</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-20623 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/106370">http://www.securityfocus.com/bid/106370</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20623">https://access.redhat.com/security/cve/CVE-2018-20623</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24049">https://sourceware.org/bugzilla/show_bug.cgi?id=24049</a><br><a href="https://support.f5.com/csp/article/K38336243">https://support.f5.com/csp/article/K38336243</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-20651 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/106440">http://www.securityfocus.com/bid/106440</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20651">https://access.redhat.com/security/cve/CVE-2018-20651</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651</a><br><a href="https://security.gentoo.org/glsa/201908-01">https://security.gentoo.org/glsa/201908-01</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24041">https://sourceware.org/bugzilla/show_bug.cgi?id=24041</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f</a><br><a href="https://support.f5.com/csp/article/K38336243">https://support.f5.com/csp/article/K38336243</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-20671 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://www.securityfocus.com/bid/106457">http://www.securityfocus.com/bid/106457</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20671">https://access.redhat.com/security/cve/CVE-2018-20671</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24005">https://sourceware.org/bugzilla/show_bug.cgi?id=24005</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-20673 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106454">http://www.securityfocus.com/bid/106454</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20673">https://access.redhat.com/security/cve/CVE-2018-20673</a><br><a href="https://linux.oracle.com/cve/CVE-2018-20673.html">https://linux.oracle.com/cve/CVE-2018-20673.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4386.html">https://linux.oracle.com/errata/ELSA-2021-4386.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24039">https://sourceware.org/bugzilla/show_bug.cgi?id=24039</a><br></details> |
| binutils | CVE-2018-20712 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106563">http://www.securityfocus.com/bid/106563</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20712">https://access.redhat.com/security/cve/CVE-2018-20712</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24043">https://sourceware.org/bugzilla/show_bug.cgi?id=24043</a><br><a href="https://support.f5.com/csp/article/K38336243">https://support.f5.com/csp/article/K38336243</a><br></details> |
| binutils | CVE-2018-8945 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3032">https://access.redhat.com/errata/RHSA-2018:3032</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-8945">https://access.redhat.com/security/cve/CVE-2018-8945</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945</a><br><a href="https://linux.oracle.com/cve/CVE-2018-8945.html">https://linux.oracle.com/cve/CVE-2018-8945.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3032.html">https://linux.oracle.com/errata/ELSA-2018-3032.html</a><br><a href="https://security.gentoo.org/glsa/201811-17">https://security.gentoo.org/glsa/201811-17</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22809">https://sourceware.org/bugzilla/show_bug.cgi?id=22809</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-9138 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9138">https://access.redhat.com/security/cve/CVE-2018-9138</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23008">https://sourceware.org/bugzilla/show_bug.cgi?id=23008</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2018-9996 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103733">http://www.securityfocus.com/bid/103733</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-9996">https://access.redhat.com/security/cve/CVE-2018-9996</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304</a><br></details> |
| binutils | CVE-2019-1010180 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html</a><br><a href="http://www.securityfocus.com/bid/109367">http://www.securityfocus.com/bid/109367</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010180">https://access.redhat.com/security/cve/CVE-2019-1010180</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180</a><br><a href="https://linux.oracle.com/cve/CVE-2019-1010180.html">https://linux.oracle.com/cve/CVE-2019-1010180.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1635.html">https://linux.oracle.com/errata/ELSA-2020-1635.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">https://nvd.nist.gov/vuln/detail/CVE-2019-1010180</a><br><a href="https://security.gentoo.org/glsa/202003-31">https://security.gentoo.org/glsa/202003-31</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23657">https://sourceware.org/bugzilla/show_bug.cgi?id=23657</a><br></details> |
| binutils | CVE-2019-1010204 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010204">https://access.redhat.com/security/cve/CVE-2019-1010204</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href="https://linux.oracle.com/cve/CVE-2019-1010204.html">https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1797.html">https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190822-0001/">https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-5349-1">https://ubuntu.com/security/notices/USN-5349-1</a><br></details> |
| binutils | CVE-2019-12972 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="http://www.securityfocus.com/bid/108903">http://www.securityfocus.com/bid/108903</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12972">https://access.redhat.com/security/cve/CVE-2019-12972</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">https://nvd.nist.gov/vuln/detail/CVE-2019-12972</a><br><a href="https://security.gentoo.org/glsa/202007-39">https://security.gentoo.org/glsa/202007-39</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24689">https://sourceware.org/bugzilla/show_bug.cgi?id=24689</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-14250 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="http://www.securityfocus.com/bid/109354">http://www.securityfocus.com/bid/109354</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-14250">https://access.redhat.com/security/cve/CVE-2019-14250</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924</a><br><a href="https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html">https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">https://nvd.nist.gov/vuln/detail/CVE-2019-14250</a><br><a href="https://security.gentoo.org/glsa/202007-39">https://security.gentoo.org/glsa/202007-39</a><br><a href="https://security.netapp.com/advisory/ntap-20190822-0002/">https://security.netapp.com/advisory/ntap-20190822-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-14444 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-14444">https://access.redhat.com/security/cve/CVE-2019-14444</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">https://nvd.nist.gov/vuln/detail/CVE-2019-14444</a><br><a href="https://security.gentoo.org/glsa/202007-39">https://security.gentoo.org/glsa/202007-39</a><br><a href="https://security.netapp.com/advisory/ntap-20190822-0002/">https://security.netapp.com/advisory/ntap-20190822-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24829">https://sourceware.org/bugzilla/show_bug.cgi?id=24829</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-17450 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17450">https://access.redhat.com/security/cve/CVE-2019-17450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17450.html">https://linux.oracle.com/cve/CVE-2019-17450.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4465.html">https://linux.oracle.com/errata/ELSA-2020-4465.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">https://nvd.nist.gov/vuln/detail/CVE-2019-17450</a><br><a href="https://security.gentoo.org/glsa/202007-39">https://security.gentoo.org/glsa/202007-39</a><br><a href="https://security.netapp.com/advisory/ntap-20191024-0002/">https://security.netapp.com/advisory/ntap-20191024-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25078">https://sourceware.org/bugzilla/show_bug.cgi?id=25078</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-17451 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17451">https://access.redhat.com/security/cve/CVE-2019-17451</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17451.html">https://linux.oracle.com/cve/CVE-2019-17451.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1797.html">https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">https://nvd.nist.gov/vuln/detail/CVE-2019-17451</a><br><a href="https://security.gentoo.org/glsa/202007-39">https://security.gentoo.org/glsa/202007-39</a><br><a href="https://security.netapp.com/advisory/ntap-20191024-0002/">https://security.netapp.com/advisory/ntap-20191024-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25070">https://sourceware.org/bugzilla/show_bug.cgi?id=25070</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-9070 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107147">http://www.securityfocus.com/bid/107147</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9070">https://access.redhat.com/security/cve/CVE-2019-9070</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9070">https://nvd.nist.gov/vuln/detail/CVE-2019-9070</a><br><a href="https://security.gentoo.org/glsa/202107-24">https://security.gentoo.org/glsa/202107-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190314-0003/">https://security.netapp.com/advisory/ntap-20190314-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24229">https://sourceware.org/bugzilla/show_bug.cgi?id=24229</a><br><a href="https://support.f5.com/csp/article/K13534168">https://support.f5.com/csp/article/K13534168</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-9071 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107147">http://www.securityfocus.com/bid/107147</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9071">https://access.redhat.com/security/cve/CVE-2019-9071</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9071">https://nvd.nist.gov/vuln/detail/CVE-2019-9071</a><br><a href="https://security.gentoo.org/glsa/202107-24">https://security.gentoo.org/glsa/202107-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190314-0003/">https://security.netapp.com/advisory/ntap-20190314-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24227">https://sourceware.org/bugzilla/show_bug.cgi?id=24227</a><br><a href="https://support.f5.com/csp/article/K02884135">https://support.f5.com/csp/article/K02884135</a><br><a href="https://ubuntu.com/security/notices/USN-4326-1">https://ubuntu.com/security/notices/USN-4326-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4326-1/">https://usn.ubuntu.com/4326-1/</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-9073 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9073">https://access.redhat.com/security/cve/CVE-2019-9073</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9073">https://nvd.nist.gov/vuln/detail/CVE-2019-9073</a><br><a href="https://security.gentoo.org/glsa/202107-24">https://security.gentoo.org/glsa/202107-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190314-0003/">https://security.netapp.com/advisory/ntap-20190314-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24233">https://sourceware.org/bugzilla/show_bug.cgi?id=24233</a><br><a href="https://support.f5.com/csp/article/K37121474">https://support.f5.com/csp/article/K37121474</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-9074 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9074">https://access.redhat.com/security/cve/CVE-2019-9074</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">https://nvd.nist.gov/vuln/detail/CVE-2019-9074</a><br><a href="https://security.gentoo.org/glsa/202107-24">https://security.gentoo.org/glsa/202107-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190314-0003/">https://security.netapp.com/advisory/ntap-20190314-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24235">https://sourceware.org/bugzilla/show_bug.cgi?id=24235</a><br><a href="https://support.f5.com/csp/article/K09092524">https://support.f5.com/csp/article/K09092524</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-9075 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9075">https://access.redhat.com/security/cve/CVE-2019-9075</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">https://nvd.nist.gov/vuln/detail/CVE-2019-9075</a><br><a href="https://security.gentoo.org/glsa/202107-24">https://security.gentoo.org/glsa/202107-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190314-0003/">https://security.netapp.com/advisory/ntap-20190314-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24236">https://sourceware.org/bugzilla/show_bug.cgi?id=24236</a><br><a href="https://support.f5.com/csp/article/K42059040">https://support.f5.com/csp/article/K42059040</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2019-9077 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html</a><br><a href="http://www.securityfocus.com/bid/107139">http://www.securityfocus.com/bid/107139</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9077">https://access.redhat.com/security/cve/CVE-2019-9077</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">https://nvd.nist.gov/vuln/detail/CVE-2019-9077</a><br><a href="https://security.gentoo.org/glsa/202107-24">https://security.gentoo.org/glsa/202107-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190314-0003/">https://security.netapp.com/advisory/ntap-20190314-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24243">https://sourceware.org/bugzilla/show_bug.cgi?id=24243</a><br><a href="https://support.f5.com/csp/article/K00056379">https://support.f5.com/csp/article/K00056379</a><br><a href="https://ubuntu.com/security/notices/USN-4336-1">https://ubuntu.com/security/notices/USN-4336-1</a><br><a href="https://ubuntu.com/security/notices/USN-4336-2">https://ubuntu.com/security/notices/USN-4336-2</a><br><a href="https://usn.ubuntu.com/4336-1/">https://usn.ubuntu.com/4336-1/</a><br></details> |
| binutils | CVE-2020-16590 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16590">https://access.redhat.com/security/cve/CVE-2020-16590</a><br><a href="https://security.netapp.com/advisory/ntap-20210115-0003/">https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25821">https://sourceware.org/bugzilla/show_bug.cgi?id=25821</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4</a><br></details> |
| binutils | CVE-2020-16591 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16591">https://access.redhat.com/security/cve/CVE-2020-16591</a><br><a href="https://security.netapp.com/advisory/ntap-20210115-0003/">https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25822">https://sourceware.org/bugzilla/show_bug.cgi?id=25822</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2</a><br></details> |
| binutils | CVE-2020-16592 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16592">https://access.redhat.com/security/cve/CVE-2020-16592</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href="https://security.netapp.com/advisory/ntap-20210115-0003/">https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href="https://ubuntu.com/security/notices/USN-5124-1">https://ubuntu.com/security/notices/USN-5124-1</a><br></details> |
| binutils | CVE-2020-16593 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16593">https://access.redhat.com/security/cve/CVE-2020-16593</a><br><a href="https://security.netapp.com/advisory/ntap-20210122-0003/">https://security.netapp.com/advisory/ntap-20210122-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25827">https://sourceware.org/bugzilla/show_bug.cgi?id=25827</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729</a><br></details> |
| binutils | CVE-2020-16599 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16599">https://access.redhat.com/security/cve/CVE-2020-16599</a><br><a href="https://security.netapp.com/advisory/ntap-20210122-0003/">https://security.netapp.com/advisory/ntap-20210122-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25842">https://sourceware.org/bugzilla/show_bug.cgi?id=25842</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4</a><br></details> |
| binutils | CVE-2020-35448 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35448">https://access.redhat.com/security/cve/CVE-2020-35448</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35448.html">https://linux.oracle.com/cve/CVE-2020-35448.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4364.html">https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210129-0008/">https://security.netapp.com/advisory/ntap-20210129-0008/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26574">https://sourceware.org/bugzilla/show_bug.cgi?id=26574</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679</a><br></details> |
| binutils | CVE-2020-35493 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35493">https://access.redhat.com/security/cve/CVE-2020-35493</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1911437">https://bugzilla.redhat.com/show_bug.cgi?id=1911437</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">https://nvd.nist.gov/vuln/detail/CVE-2020-35493</a><br><a href="https://security.netapp.com/advisory/ntap-20210212-0007/">https://security.netapp.com/advisory/ntap-20210212-0007/</a><br></details> |
| binutils | CVE-2020-35494 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35494">https://access.redhat.com/security/cve/CVE-2020-35494</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1911439">https://bugzilla.redhat.com/show_bug.cgi?id=1911439</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35494">https://nvd.nist.gov/vuln/detail/CVE-2020-35494</a><br><a href="https://security.netapp.com/advisory/ntap-20210212-0007/">https://security.netapp.com/advisory/ntap-20210212-0007/</a><br></details> |
| binutils | CVE-2020-35495 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35495">https://access.redhat.com/security/cve/CVE-2020-35495</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1911441">https://bugzilla.redhat.com/show_bug.cgi?id=1911441</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35495">https://nvd.nist.gov/vuln/detail/CVE-2020-35495</a><br><a href="https://security.netapp.com/advisory/ntap-20210212-0007/">https://security.netapp.com/advisory/ntap-20210212-0007/</a><br></details> |
| binutils | CVE-2020-35496 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35496">https://access.redhat.com/security/cve/CVE-2020-35496</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1911444">https://bugzilla.redhat.com/show_bug.cgi?id=1911444</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">https://nvd.nist.gov/vuln/detail/CVE-2020-35496</a><br><a href="https://security.netapp.com/advisory/ntap-20210212-0007/">https://security.netapp.com/advisory/ntap-20210212-0007/</a><br></details> |
| binutils | CVE-2020-35507 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35507">https://access.redhat.com/security/cve/CVE-2020-35507</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1911691">https://bugzilla.redhat.com/show_bug.cgi?id=1911691</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">https://nvd.nist.gov/vuln/detail/CVE-2020-35507</a><br><a href="https://security.netapp.com/advisory/ntap-20210212-0007/">https://security.netapp.com/advisory/ntap-20210212-0007/</a><br></details> |
| binutils | CVE-2021-20197 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20197">https://access.redhat.com/security/cve/CVE-2021-20197</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1913743">https://bugzilla.redhat.com/show_bug.cgi?id=1913743</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20197.html">https://linux.oracle.com/cve/CVE-2021-20197.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4364.html">https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">https://nvd.nist.gov/vuln/detail/CVE-2021-20197</a><br><a href="https://security.netapp.com/advisory/ntap-20210528-0009/">https://security.netapp.com/advisory/ntap-20210528-0009/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26945">https://sourceware.org/bugzilla/show_bug.cgi?id=26945</a><br></details> |
| binutils | CVE-2021-20284 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20284">https://access.redhat.com/security/cve/CVE-2021-20284</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1937784">https://bugzilla.redhat.com/show_bug.cgi?id=1937784</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20284.html">https://linux.oracle.com/cve/CVE-2021-20284.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4364.html">https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0010/">https://security.netapp.com/advisory/ntap-20210521-0010/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26931">https://sourceware.org/bugzilla/show_bug.cgi?id=26931</a><br></details> |
| binutils | CVE-2021-20294 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20294">https://access.redhat.com/security/cve/CVE-2021-20294</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943533">https://bugzilla.redhat.com/show_bug.cgi?id=1943533</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">https://nvd.nist.gov/vuln/detail/CVE-2021-20294</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26929">https://sourceware.org/bugzilla/show_bug.cgi?id=26929</a><br><a href="https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926">https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926</a><br></details> |
| binutils | CVE-2021-3487 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3487">https://access.redhat.com/security/cve/CVE-2021-3487</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3487.html">https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4364.html">https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">https://nvd.nist.gov/vuln/detail/CVE-2021-3487</a><br><a href="https://ubuntu.com/security/notices/USN-5124-1">https://ubuntu.com/security/notices/USN-5124-1</a><br><a href="https://ubuntu.com/security/notices/USN-5341-1">https://ubuntu.com/security/notices/USN-5341-1</a><br></details> |
| binutils | CVE-2021-3530 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3530">https://access.redhat.com/security/cve/CVE-2021-3530</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956423">https://bugzilla.redhat.com/show_bug.cgi?id=1956423</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530</a><br><a href="https://security.netapp.com/advisory/ntap-20210716-0006/">https://security.netapp.com/advisory/ntap-20210716-0006/</a><br><a href="https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch">https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch</a><br></details> |
| binutils | CVE-2021-3549 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3549">https://access.redhat.com/security/cve/CVE-2021-3549</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1960717">https://bugzilla.redhat.com/show_bug.cgi?id=1960717</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549</a><br></details> |
| binutils | CVE-2021-45078 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45078">https://access.redhat.com/security/cve/CVE-2021-45078</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">https://nvd.nist.gov/vuln/detail/CVE-2021-45078</a><br><a href="https://security.netapp.com/advisory/ntap-20220107-0002/">https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href="https://ubuntu.com/security/notices/USN-5341-1">https://ubuntu.com/security/notices/USN-5341-1</a><br></details> |
| binutils | CVE-2021-46195 | LOW | 2.28-5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46195">https://access.redhat.com/security/cve/CVE-2021-46195</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841</a><br></details> |
| bsdutils | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| bsdutils | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| bsdutils | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| bzip2 | CVE-2019-12900 | CRITICAL | 1.0.6-8.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html</a><br><a href="http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html">http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html</a><br><a href="http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html">http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12900">https://access.redhat.com/security/cve/CVE-2019-12900</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494">https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900</a><br><a href="https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc">https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc</a><br><a href="https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E">https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E">https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">https://nvd.nist.gov/vuln/detail/CVE-2019-12900</a><br><a href="https://seclists.org/bugtraq/2019/Aug/4">https://seclists.org/bugtraq/2019/Aug/4</a><br><a href="https://seclists.org/bugtraq/2019/Jul/22">https://seclists.org/bugtraq/2019/Jul/22</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc</a><br><a href="https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4038-1">https://ubuntu.com/security/notices/USN-4038-1</a><br><a href="https://ubuntu.com/security/notices/USN-4038-2">https://ubuntu.com/security/notices/USN-4038-2</a><br><a href="https://ubuntu.com/security/notices/USN-4038-3">https://ubuntu.com/security/notices/USN-4038-3</a><br><a href="https://ubuntu.com/security/notices/USN-4038-4">https://ubuntu.com/security/notices/USN-4038-4</a><br><a href="https://ubuntu.com/security/notices/USN-4146-1">https://ubuntu.com/security/notices/USN-4146-1</a><br><a href="https://ubuntu.com/security/notices/USN-4146-2">https://ubuntu.com/security/notices/USN-4146-2</a><br><a href="https://usn.ubuntu.com/4038-1/">https://usn.ubuntu.com/4038-1/</a><br><a href="https://usn.ubuntu.com/4038-2/">https://usn.ubuntu.com/4038-2/</a><br><a href="https://usn.ubuntu.com/4146-1/">https://usn.ubuntu.com/4146-1/</a><br><a href="https://usn.ubuntu.com/4146-2/">https://usn.ubuntu.com/4146-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| ca-certificates | DLA-2593-1 | UNKNOWN | 20200601~deb9u1 | 20200601~deb9u2 | <details><summary>Expand...</summary></details> |
| coreutils | CVE-2016-2781 | LOW | 8.26-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| coreutils | CVE-2017-18018 | LOW | 8.26-3 | | <details><summary>Expand...</summary><a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18018">https://access.redhat.com/security/cve/CVE-2017-18018</a><br></details> |
| cpp-6 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| curl | CVE-2021-22946 | HIGH | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22876 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u14 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22876">https://access.redhat.com/security/cve/CVE-2021-22876</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22876.html">https://curl.se/docs/CVE-2021-22876.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876</a><br><a href="https://hackerone.com/reports/1101882">https://hackerone.com/reports/1101882</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22876.html">https://linux.oracle.com/cve/CVE-2021-22876.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/</a><br><a href="https://security.gentoo.org/glsa/202105-36">https://security.gentoo.org/glsa/202105-36</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0007/">https://security.netapp.com/advisory/ntap-20210521-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4898-1">https://ubuntu.com/security/notices/USN-4898-1</a><br><a href="https://ubuntu.com/security/notices/USN-4903-1">https://ubuntu.com/security/notices/USN-4903-1</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br></details> |
| curl | CVE-2021-22947 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22898 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| curl | CVE-2021-22922 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22923 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22924 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| debian-archive-keyring | DLA-2948-1 | UNKNOWN | 2017.5+deb9u1 | 2017.5+deb9u2 | <details><summary>Expand...</summary></details> |
| dirmngr | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000858">https://access.redhat.com/security/cve/CVE-2018-1000858</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858</a><br><a href="https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html">https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html</a><br><a href="https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html">https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html</a><br><a href="https://ubuntu.com/security/notices/USN-3853-1">https://ubuntu.com/security/notices/USN-3853-1</a><br><a href="https://usn.ubuntu.com/3853-1/">https://usn.ubuntu.com/3853-1/</a><br></details> |
| dirmngr | CVE-2018-9234 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9234">https://access.redhat.com/security/cve/CVE-2018-9234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234</a><br><a href="https://dev.gnupg.org/T3844">https://dev.gnupg.org/T3844</a><br><a href="https://ubuntu.com/security/notices/USN-3675-1">https://ubuntu.com/security/notices/USN-3675-1</a><br><a href="https://usn.ubuntu.com/3675-1/">https://usn.ubuntu.com/3675-1/</a><br></details> |
| dirmngr | CVE-2019-14855 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| file | CVE-2019-8907 | HIGH | 1:5.30-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8907">https://access.redhat.com/security/cve/CVE-2019-8907</a><br><a href="https://bugs.astron.com/view.php?id=65">https://bugs.astron.com/view.php?id=65</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html</a><br><a href="https://ubuntu.com/security/notices/USN-3911-1">https://ubuntu.com/security/notices/USN-3911-1</a><br><a href="https://usn.ubuntu.com/3911-1/">https://usn.ubuntu.com/3911-1/</a><br></details> |
| file | CVE-2019-8905 | MEDIUM | 1:5.30-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html</a><br><a href="http://www.securityfocus.com/bid/107137">http://www.securityfocus.com/bid/107137</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8905">https://access.redhat.com/security/cve/CVE-2019-8905</a><br><a href="https://bugs.astron.com/view.php?id=63">https://bugs.astron.com/view.php?id=63</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html</a><br><a href="https://ubuntu.com/security/notices/USN-3911-1">https://ubuntu.com/security/notices/USN-3911-1</a><br><a href="https://usn.ubuntu.com/3911-1/">https://usn.ubuntu.com/3911-1/</a><br></details> |
| g++-6 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gcc-6 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gcc-6-base | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gir1.2-gdkpixbuf-2.0 | CVE-2017-2870 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100541">http://www.securityfocus.com/bid/100541</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-2870">https://access.redhat.com/security/cve/CVE-2017-2870</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html">https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377">https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377</a><br></details> |
| gir1.2-gdkpixbuf-2.0 | CVE-2017-6311 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html">http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/21/4">http://www.openwall.com/lists/oss-security/2017/02/21/4</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/26/1">http://www.openwall.com/lists/oss-security/2017/02/26/1</a><br><a href="http://www.securityfocus.com/bid/96779">http://www.securityfocus.com/bid/96779</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6311">https://access.redhat.com/security/cve/CVE-2017-6311</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=778204">https://bugzilla.gnome.org/show_bug.cgi?id=778204</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/</a><br><a href="https://security.gentoo.org/glsa/201709-08">https://security.gentoo.org/glsa/201709-08</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br></details> |
| git | CVE-2021-21300 | HIGH | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html">http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html</a><br><a href="http://seclists.org/fulldisclosure/2021/Apr/60">http://seclists.org/fulldisclosure/2021/Apr/60</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/09/3">http://www.openwall.com/lists/oss-security/2021/03/09/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21300">https://access.redhat.com/security/cve/CVE-2021-21300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300</a><br><a href="https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks">https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks</a><br><a href="https://git-scm.com/docs/gitattributes#_filter">https://git-scm.com/docs/gitattributes#_filter</a><br><a href="https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592">https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592</a><br><a href="https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm">https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/</a><br><a href="https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/">https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202104-01">https://security.gentoo.org/glsa/202104-01</a><br><a href="https://support.apple.com/kb/HT212320">https://support.apple.com/kb/HT212320</a><br><a href="https://ubuntu.com/security/notices/USN-4761-1">https://ubuntu.com/security/notices/USN-4761-1</a><br></details> |
| git | CVE-2021-40330 | HIGH | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-40330">https://access.redhat.com/security/cve/CVE-2021-40330</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330</a><br><a href="https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473">https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473</a><br><a href="https://github.com/git/git/compare/v2.30.0...v2.30.1">https://github.com/git/git/compare/v2.30.0...v2.30.1</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">https://nvd.nist.gov/vuln/detail/CVE-2021-40330</a><br><a href="https://ubuntu.com/security/notices/USN-5076-1">https://ubuntu.com/security/notices/USN-5076-1</a><br></details> |
| git | CVE-2017-15298 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15298">https://access.redhat.com/security/cve/CVE-2017-15298</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298</a><br><a href="https://github.com/Katee/git-bomb">https://github.com/Katee/git-bomb</a><br><a href="https://kate.io/blog/git-bomb/">https://kate.io/blog/git-bomb/</a><br><a href="https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2">https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2</a><br><a href="https://ubuntu.com/security/notices/USN-3829-1">https://ubuntu.com/security/notices/USN-3829-1</a><br><a href="https://usn.ubuntu.com/3829-1/">https://usn.ubuntu.com/3829-1/</a><br></details> |
| git | CVE-2018-1000021 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html">http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000021">https://access.redhat.com/security/cve/CVE-2018-1000021</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021</a><br></details> |
| git | CVE-2019-1350 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1350">https://access.redhat.com/security/cve/CVE-2019-1350</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350</a><br><a href="https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x">https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x</a><br><a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350</a><br><a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a><br><a href="https://security.gentoo.org/glsa/202003-42">https://security.gentoo.org/glsa/202003-42</a><br><a href="https://ubuntu.com/security/notices/USN-4220-1">https://ubuntu.com/security/notices/USN-4220-1</a><br></details> |
| git | CVE-2019-1351 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1351">https://access.redhat.com/security/cve/CVE-2019-1351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351</a><br><a href="https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f">https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f</a><br><a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351</a><br><a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a><br><a href="https://ubuntu.com/security/notices/USN-4220-1">https://ubuntu.com/security/notices/USN-4220-1</a><br></details> |
| git | CVE-2019-1354 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1354">https://access.redhat.com/security/cve/CVE-2019-1354</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354</a><br><a href="https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq">https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq</a><br><a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354</a><br><a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a><br><a href="https://ubuntu.com/security/notices/USN-4220-1">https://ubuntu.com/security/notices/USN-4220-1</a><br></details> |
| git | CVE-2022-24975 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24975">https://access.redhat.com/security/cve/CVE-2022-24975</a><br><a href="https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191">https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191</a><br><a href="https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/">https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/</a><br></details> |
| git-man | CVE-2021-21300 | HIGH | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html">http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html</a><br><a href="http://seclists.org/fulldisclosure/2021/Apr/60">http://seclists.org/fulldisclosure/2021/Apr/60</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/09/3">http://www.openwall.com/lists/oss-security/2021/03/09/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21300">https://access.redhat.com/security/cve/CVE-2021-21300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300</a><br><a href="https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks">https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks</a><br><a href="https://git-scm.com/docs/gitattributes#_filter">https://git-scm.com/docs/gitattributes#_filter</a><br><a href="https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592">https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592</a><br><a href="https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm">https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/</a><br><a href="https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/">https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202104-01">https://security.gentoo.org/glsa/202104-01</a><br><a href="https://support.apple.com/kb/HT212320">https://support.apple.com/kb/HT212320</a><br><a href="https://ubuntu.com/security/notices/USN-4761-1">https://ubuntu.com/security/notices/USN-4761-1</a><br></details> |
| git-man | CVE-2021-40330 | HIGH | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-40330">https://access.redhat.com/security/cve/CVE-2021-40330</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330</a><br><a href="https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473">https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473</a><br><a href="https://github.com/git/git/compare/v2.30.0...v2.30.1">https://github.com/git/git/compare/v2.30.0...v2.30.1</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">https://nvd.nist.gov/vuln/detail/CVE-2021-40330</a><br><a href="https://ubuntu.com/security/notices/USN-5076-1">https://ubuntu.com/security/notices/USN-5076-1</a><br></details> |
| git-man | CVE-2017-15298 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15298">https://access.redhat.com/security/cve/CVE-2017-15298</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298</a><br><a href="https://github.com/Katee/git-bomb">https://github.com/Katee/git-bomb</a><br><a href="https://kate.io/blog/git-bomb/">https://kate.io/blog/git-bomb/</a><br><a href="https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2">https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2</a><br><a href="https://ubuntu.com/security/notices/USN-3829-1">https://ubuntu.com/security/notices/USN-3829-1</a><br><a href="https://usn.ubuntu.com/3829-1/">https://usn.ubuntu.com/3829-1/</a><br></details> |
| git-man | CVE-2018-1000021 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html">http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000021">https://access.redhat.com/security/cve/CVE-2018-1000021</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021</a><br></details> |
| git-man | CVE-2019-1350 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1350">https://access.redhat.com/security/cve/CVE-2019-1350</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350</a><br><a href="https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x">https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x</a><br><a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350</a><br><a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a><br><a href="https://security.gentoo.org/glsa/202003-42">https://security.gentoo.org/glsa/202003-42</a><br><a href="https://ubuntu.com/security/notices/USN-4220-1">https://ubuntu.com/security/notices/USN-4220-1</a><br></details> |
| git-man | CVE-2019-1351 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1351">https://access.redhat.com/security/cve/CVE-2019-1351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351</a><br><a href="https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f">https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f</a><br><a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351</a><br><a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a><br><a href="https://ubuntu.com/security/notices/USN-4220-1">https://ubuntu.com/security/notices/USN-4220-1</a><br></details> |
| git-man | CVE-2019-1354 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1354">https://access.redhat.com/security/cve/CVE-2019-1354</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354</a><br><a href="https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq">https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq</a><br><a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354</a><br><a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a><br><a href="https://ubuntu.com/security/notices/USN-4220-1">https://ubuntu.com/security/notices/USN-4220-1</a><br></details> |
| git-man | CVE-2022-24975 | LOW | 1:2.11.0-3+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24975">https://access.redhat.com/security/cve/CVE-2022-24975</a><br><a href="https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191">https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191</a><br><a href="https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/">https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/</a><br></details> |
| gnupg | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000858">https://access.redhat.com/security/cve/CVE-2018-1000858</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858</a><br><a href="https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html">https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html</a><br><a href="https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html">https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html</a><br><a href="https://ubuntu.com/security/notices/USN-3853-1">https://ubuntu.com/security/notices/USN-3853-1</a><br><a href="https://usn.ubuntu.com/3853-1/">https://usn.ubuntu.com/3853-1/</a><br></details> |
| gnupg | CVE-2018-9234 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9234">https://access.redhat.com/security/cve/CVE-2018-9234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234</a><br><a href="https://dev.gnupg.org/T3844">https://dev.gnupg.org/T3844</a><br><a href="https://ubuntu.com/security/notices/USN-3675-1">https://ubuntu.com/security/notices/USN-3675-1</a><br><a href="https://usn.ubuntu.com/3675-1/">https://usn.ubuntu.com/3675-1/</a><br></details> |
| gnupg | CVE-2019-14855 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| gnupg-agent | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000858">https://access.redhat.com/security/cve/CVE-2018-1000858</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858</a><br><a href="https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html">https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html</a><br><a href="https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html">https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html</a><br><a href="https://ubuntu.com/security/notices/USN-3853-1">https://ubuntu.com/security/notices/USN-3853-1</a><br><a href="https://usn.ubuntu.com/3853-1/">https://usn.ubuntu.com/3853-1/</a><br></details> |
| gnupg-agent | CVE-2018-9234 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9234">https://access.redhat.com/security/cve/CVE-2018-9234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234</a><br><a href="https://dev.gnupg.org/T3844">https://dev.gnupg.org/T3844</a><br><a href="https://ubuntu.com/security/notices/USN-3675-1">https://ubuntu.com/security/notices/USN-3675-1</a><br><a href="https://usn.ubuntu.com/3675-1/">https://usn.ubuntu.com/3675-1/</a><br></details> |
| gnupg-agent | CVE-2019-14855 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| gpgv | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000858">https://access.redhat.com/security/cve/CVE-2018-1000858</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858</a><br><a href="https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html">https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html</a><br><a href="https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html">https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html</a><br><a href="https://ubuntu.com/security/notices/USN-3853-1">https://ubuntu.com/security/notices/USN-3853-1</a><br><a href="https://usn.ubuntu.com/3853-1/">https://usn.ubuntu.com/3853-1/</a><br></details> |
| gpgv | CVE-2018-9234 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9234">https://access.redhat.com/security/cve/CVE-2018-9234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234</a><br><a href="https://dev.gnupg.org/T3844">https://dev.gnupg.org/T3844</a><br><a href="https://ubuntu.com/security/notices/USN-3675-1">https://ubuntu.com/security/notices/USN-3675-1</a><br><a href="https://usn.ubuntu.com/3675-1/">https://usn.ubuntu.com/3675-1/</a><br></details> |
| gpgv | CVE-2019-14855 | LOW | 2.1.18-8~deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| icu-devtools | CVE-2020-21913 | MEDIUM | 57.1-6+deb9u4 | 57.1-6+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-21913">https://access.redhat.com/security/cve/CVE-2020-21913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913</a><br><a href="https://github.com/unicode-org/icu/pull/886">https://github.com/unicode-org/icu/pull/886</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html</a><br><a href="https://ubuntu.com/security/notices/USN-5133-1">https://ubuntu.com/security/notices/USN-5133-1</a><br><a href="https://unicode-org.atlassian.net/browse/ICU-20850">https://unicode-org.atlassian.net/browse/ICU-20850</a><br><a href="https://www.debian.org/security/2021/dsa-5014">https://www.debian.org/security/2021/dsa-5014</a><br></details> |
| imagemagick | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| imagemagick | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| imagemagick | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| imagemagick | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| imagemagick | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| imagemagick | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| imagemagick | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| imagemagick | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| imagemagick | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| imagemagick | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| imagemagick | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| imagemagick | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| imagemagick | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| imagemagick | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| imagemagick | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| imagemagick | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| imagemagick | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| imagemagick | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| imagemagick | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| imagemagick | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| imagemagick | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| imagemagick | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| imagemagick | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| imagemagick | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| imagemagick | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| imagemagick | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| imagemagick | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| imagemagick | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| imagemagick | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| imagemagick | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| imagemagick | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| imagemagick | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| imagemagick | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| imagemagick | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| imagemagick | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| imagemagick | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| imagemagick | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| imagemagick | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| imagemagick | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| imagemagick | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| imagemagick | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| imagemagick | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| imagemagick | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| imagemagick | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| imagemagick | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| imagemagick | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| imagemagick | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| imagemagick | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| imagemagick | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| imagemagick-6-common | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| imagemagick-6-common | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6-common | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6-common | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| imagemagick-6-common | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| imagemagick-6-common | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| imagemagick-6-common | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| imagemagick-6-common | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| imagemagick-6-common | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| imagemagick-6-common | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| imagemagick-6-common | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| imagemagick-6-common | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6-common | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| imagemagick-6-common | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| imagemagick-6-common | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6-common | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| imagemagick-6-common | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| imagemagick-6-common | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| imagemagick-6-common | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| imagemagick-6-common | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| imagemagick-6-common | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| imagemagick-6-common | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| imagemagick-6-common | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| imagemagick-6-common | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| imagemagick-6-common | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| imagemagick-6-common | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| imagemagick-6-common | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| imagemagick-6-common | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| imagemagick-6-common | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| imagemagick-6-common | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| imagemagick-6-common | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| imagemagick-6-common | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| imagemagick-6-common | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| imagemagick-6-common | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6-common | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6-common | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6-common | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6-common | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| imagemagick-6-common | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| imagemagick-6-common | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| imagemagick-6-common | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| imagemagick-6-common | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| imagemagick-6-common | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6-common | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| imagemagick-6-common | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| imagemagick-6-common | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| imagemagick-6-common | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| imagemagick-6-common | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| imagemagick-6-common | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6-common | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| imagemagick-6.q16 | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| imagemagick-6.q16 | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| imagemagick-6.q16 | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| imagemagick-6.q16 | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| imagemagick-6.q16 | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| imagemagick-6.q16 | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| imagemagick-6.q16 | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| imagemagick-6.q16 | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| imagemagick-6.q16 | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| imagemagick-6.q16 | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| imagemagick-6.q16 | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| imagemagick-6.q16 | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| imagemagick-6.q16 | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| imagemagick-6.q16 | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| imagemagick-6.q16 | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| imagemagick-6.q16 | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| imagemagick-6.q16 | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| krb5-multidev | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| krb5-multidev | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| krb5-multidev | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| krb5-multidev | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| krb5-multidev | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| krb5-multidev | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| krb5-multidev | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| krb5-multidev | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| krb5-multidev | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libapr1 | CVE-2017-12613 | HIGH | 1.5.2-5 | 1.5.2-5+deb9u1 | <details><summary>Expand...</summary><a href="http://www.apache.org/dist/apr/Announcement1.x.html">http://www.apache.org/dist/apr/Announcement1.x.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/23/1">http://www.openwall.com/lists/oss-security/2021/08/23/1</a><br><a href="http://www.securityfocus.com/bid/101560">http://www.securityfocus.com/bid/101560</a><br><a href="http://www.securitytracker.com/id/1042004">http://www.securitytracker.com/id/1042004</a><br><a href="https://access.redhat.com/errata/RHSA-2017:3270">https://access.redhat.com/errata/RHSA-2017:3270</a><br><a href="https://access.redhat.com/errata/RHSA-2017:3475">https://access.redhat.com/errata/RHSA-2017:3475</a><br><a href="https://access.redhat.com/errata/RHSA-2017:3476">https://access.redhat.com/errata/RHSA-2017:3476</a><br><a href="https://access.redhat.com/errata/RHSA-2017:3477">https://access.redhat.com/errata/RHSA-2017:3477</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0316">https://access.redhat.com/errata/RHSA-2018:0316</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0465">https://access.redhat.com/errata/RHSA-2018:0465</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0466">https://access.redhat.com/errata/RHSA-2018:0466</a><br><a href="https://access.redhat.com/errata/RHSA-2018:1253">https://access.redhat.com/errata/RHSA-2018:1253</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12613">https://access.redhat.com/security/cve/CVE-2017-12613</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12613.html">https://linux.oracle.com/cve/CVE-2017-12613.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2017-3270.html">https://linux.oracle.com/errata/ELSA-2017-3270.html</a><br><a href="https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E">https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E">https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E">https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E">https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html</a><br><a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1807976">https://svn.apache.org/viewvc?view=revision&amp;revision=1807976</a><br></details> |
| libaprutil1 | CVE-2017-12618 | LOW | 1.5.4-3 | | <details><summary>Expand...</summary><a href="http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E">http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E</a><br><a href="http://www.apache.org/dist/apr/Announcement1.x.html">http://www.apache.org/dist/apr/Announcement1.x.html</a><br><a href="http://www.securityfocus.com/bid/101558">http://www.securityfocus.com/bid/101558</a><br><a href="http://www.securitytracker.com/id/1042004">http://www.securitytracker.com/id/1042004</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12618">https://access.redhat.com/security/cve/CVE-2017-12618</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html</a><br></details> |
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.4.11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| libasan3 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libatomic1 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libavahi-client3 | CVE-2021-26720 | HIGH | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824">https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1180827">https://bugzilla.suse.com/show_bug.cgi?id=1180827</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720</a><br><a href="https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog">https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">https://nvd.nist.gov/vuln/detail/CVE-2021-26720</a><br><a href="https://packages.debian.org/bullseye/avahi-daemon">https://packages.debian.org/bullseye/avahi-daemon</a><br><a href="https://packages.debian.org/buster/avahi-daemon">https://packages.debian.org/buster/avahi-daemon</a><br><a href="https://packages.debian.org/sid/avahi-daemon">https://packages.debian.org/sid/avahi-daemon</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2021-26720">https://security-tracker.debian.org/tracker/CVE-2021-26720</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/15/2">https://www.openwall.com/lists/oss-security/2021/02/15/2</a><br></details> |
| libavahi-client3 | CVE-2021-3468 | MEDIUM | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3468">https://access.redhat.com/security/cve/CVE-2021-3468</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939614">https://bugzilla.redhat.com/show_bug.cgi?id=1939614</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">https://nvd.nist.gov/vuln/detail/CVE-2021-3468</a><br><a href="https://ubuntu.com/security/notices/USN-5008-1">https://ubuntu.com/security/notices/USN-5008-1</a><br><a href="https://ubuntu.com/security/notices/USN-5008-2">https://ubuntu.com/security/notices/USN-5008-2</a><br></details> |
| libavahi-client3 | CVE-2017-6519 | LOW | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-6519">https://access.redhat.com/security/cve/CVE-2017-6519</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1426712">https://bugzilla.redhat.com/show_bug.cgi?id=1426712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519</a><br><a href="https://github.com/lathiat/avahi/issues/203">https://github.com/lathiat/avahi/issues/203</a><br><a href="https://github.com/lathiat/avahi/issues/203#issuecomment-449536790">https://github.com/lathiat/avahi/issues/203#issuecomment-449536790</a><br><a href="https://linux.oracle.com/cve/CVE-2017-6519.html">https://linux.oracle.com/cve/CVE-2017-6519.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1176.html">https://linux.oracle.com/errata/ELSA-2020-1176.html</a><br><a href="https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">https://nvd.nist.gov/vuln/detail/CVE-2017-6519</a><br><a href="https://ubuntu.com/security/notices/USN-3876-1">https://ubuntu.com/security/notices/USN-3876-1</a><br><a href="https://ubuntu.com/security/notices/USN-3876-2">https://ubuntu.com/security/notices/USN-3876-2</a><br><a href="https://usn.ubuntu.com/3876-1/">https://usn.ubuntu.com/3876-1/</a><br><a href="https://usn.ubuntu.com/3876-2/">https://usn.ubuntu.com/3876-2/</a><br><a href="https://www.kb.cert.org/vuls/id/550620">https://www.kb.cert.org/vuls/id/550620</a><br><a href="https://www.secfu.net/advisories">https://www.secfu.net/advisories</a><br></details> |
| libavahi-common-data | CVE-2021-26720 | HIGH | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824">https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1180827">https://bugzilla.suse.com/show_bug.cgi?id=1180827</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720</a><br><a href="https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog">https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">https://nvd.nist.gov/vuln/detail/CVE-2021-26720</a><br><a href="https://packages.debian.org/bullseye/avahi-daemon">https://packages.debian.org/bullseye/avahi-daemon</a><br><a href="https://packages.debian.org/buster/avahi-daemon">https://packages.debian.org/buster/avahi-daemon</a><br><a href="https://packages.debian.org/sid/avahi-daemon">https://packages.debian.org/sid/avahi-daemon</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2021-26720">https://security-tracker.debian.org/tracker/CVE-2021-26720</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/15/2">https://www.openwall.com/lists/oss-security/2021/02/15/2</a><br></details> |
| libavahi-common-data | CVE-2021-3468 | MEDIUM | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3468">https://access.redhat.com/security/cve/CVE-2021-3468</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939614">https://bugzilla.redhat.com/show_bug.cgi?id=1939614</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">https://nvd.nist.gov/vuln/detail/CVE-2021-3468</a><br><a href="https://ubuntu.com/security/notices/USN-5008-1">https://ubuntu.com/security/notices/USN-5008-1</a><br><a href="https://ubuntu.com/security/notices/USN-5008-2">https://ubuntu.com/security/notices/USN-5008-2</a><br></details> |
| libavahi-common-data | CVE-2017-6519 | LOW | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-6519">https://access.redhat.com/security/cve/CVE-2017-6519</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1426712">https://bugzilla.redhat.com/show_bug.cgi?id=1426712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519</a><br><a href="https://github.com/lathiat/avahi/issues/203">https://github.com/lathiat/avahi/issues/203</a><br><a href="https://github.com/lathiat/avahi/issues/203#issuecomment-449536790">https://github.com/lathiat/avahi/issues/203#issuecomment-449536790</a><br><a href="https://linux.oracle.com/cve/CVE-2017-6519.html">https://linux.oracle.com/cve/CVE-2017-6519.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1176.html">https://linux.oracle.com/errata/ELSA-2020-1176.html</a><br><a href="https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">https://nvd.nist.gov/vuln/detail/CVE-2017-6519</a><br><a href="https://ubuntu.com/security/notices/USN-3876-1">https://ubuntu.com/security/notices/USN-3876-1</a><br><a href="https://ubuntu.com/security/notices/USN-3876-2">https://ubuntu.com/security/notices/USN-3876-2</a><br><a href="https://usn.ubuntu.com/3876-1/">https://usn.ubuntu.com/3876-1/</a><br><a href="https://usn.ubuntu.com/3876-2/">https://usn.ubuntu.com/3876-2/</a><br><a href="https://www.kb.cert.org/vuls/id/550620">https://www.kb.cert.org/vuls/id/550620</a><br><a href="https://www.secfu.net/advisories">https://www.secfu.net/advisories</a><br></details> |
| libavahi-common3 | CVE-2021-26720 | HIGH | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824">https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1180827">https://bugzilla.suse.com/show_bug.cgi?id=1180827</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720</a><br><a href="https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog">https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">https://nvd.nist.gov/vuln/detail/CVE-2021-26720</a><br><a href="https://packages.debian.org/bullseye/avahi-daemon">https://packages.debian.org/bullseye/avahi-daemon</a><br><a href="https://packages.debian.org/buster/avahi-daemon">https://packages.debian.org/buster/avahi-daemon</a><br><a href="https://packages.debian.org/sid/avahi-daemon">https://packages.debian.org/sid/avahi-daemon</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2021-26720">https://security-tracker.debian.org/tracker/CVE-2021-26720</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/15/2">https://www.openwall.com/lists/oss-security/2021/02/15/2</a><br></details> |
| libavahi-common3 | CVE-2021-3468 | MEDIUM | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3468">https://access.redhat.com/security/cve/CVE-2021-3468</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939614">https://bugzilla.redhat.com/show_bug.cgi?id=1939614</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">https://nvd.nist.gov/vuln/detail/CVE-2021-3468</a><br><a href="https://ubuntu.com/security/notices/USN-5008-1">https://ubuntu.com/security/notices/USN-5008-1</a><br><a href="https://ubuntu.com/security/notices/USN-5008-2">https://ubuntu.com/security/notices/USN-5008-2</a><br></details> |
| libavahi-common3 | CVE-2017-6519 | LOW | 0.6.32-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-6519">https://access.redhat.com/security/cve/CVE-2017-6519</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1426712">https://bugzilla.redhat.com/show_bug.cgi?id=1426712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519</a><br><a href="https://github.com/lathiat/avahi/issues/203">https://github.com/lathiat/avahi/issues/203</a><br><a href="https://github.com/lathiat/avahi/issues/203#issuecomment-449536790">https://github.com/lathiat/avahi/issues/203#issuecomment-449536790</a><br><a href="https://linux.oracle.com/cve/CVE-2017-6519.html">https://linux.oracle.com/cve/CVE-2017-6519.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1176.html">https://linux.oracle.com/errata/ELSA-2020-1176.html</a><br><a href="https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">https://nvd.nist.gov/vuln/detail/CVE-2017-6519</a><br><a href="https://ubuntu.com/security/notices/USN-3876-1">https://ubuntu.com/security/notices/USN-3876-1</a><br><a href="https://ubuntu.com/security/notices/USN-3876-2">https://ubuntu.com/security/notices/USN-3876-2</a><br><a href="https://usn.ubuntu.com/3876-1/">https://usn.ubuntu.com/3876-1/</a><br><a href="https://usn.ubuntu.com/3876-2/">https://usn.ubuntu.com/3876-2/</a><br><a href="https://www.kb.cert.org/vuls/id/550620">https://www.kb.cert.org/vuls/id/550620</a><br><a href="https://www.secfu.net/advisories">https://www.secfu.net/advisories</a><br></details> |
| libblkid1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| libblkid1 | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libblkid1 | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libbsd0 | CVE-2019-20367 | CRITICAL | 0.8.3-1 | 0.8.3-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367</a><br><a href="https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b">https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b</a><br><a href="https://lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5@%3Cdev.tomee.apache.org%3E">https://lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5@%3Cdev.tomee.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550@%3Cdev.tomee.apache.org%3E">https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550@%3Cdev.tomee.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00027.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00027.html</a><br><a href="https://lists.freedesktop.org/archives/libbsd/2019-August/000229.html">https://lists.freedesktop.org/archives/libbsd/2019-August/000229.html</a><br><a href="https://ubuntu.com/security/notices/USN-4243-1">https://ubuntu.com/security/notices/USN-4243-1</a><br><a href="https://usn.ubuntu.com/4243-1/">https://usn.ubuntu.com/4243-1/</a><br></details> |
| libbz2-1.0 | CVE-2019-12900 | CRITICAL | 1.0.6-8.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html</a><br><a href="http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html">http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html</a><br><a href="http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html">http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12900">https://access.redhat.com/security/cve/CVE-2019-12900</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494">https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900</a><br><a href="https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc">https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc</a><br><a href="https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E">https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E">https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">https://nvd.nist.gov/vuln/detail/CVE-2019-12900</a><br><a href="https://seclists.org/bugtraq/2019/Aug/4">https://seclists.org/bugtraq/2019/Aug/4</a><br><a href="https://seclists.org/bugtraq/2019/Jul/22">https://seclists.org/bugtraq/2019/Jul/22</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc</a><br><a href="https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4038-1">https://ubuntu.com/security/notices/USN-4038-1</a><br><a href="https://ubuntu.com/security/notices/USN-4038-2">https://ubuntu.com/security/notices/USN-4038-2</a><br><a href="https://ubuntu.com/security/notices/USN-4038-3">https://ubuntu.com/security/notices/USN-4038-3</a><br><a href="https://ubuntu.com/security/notices/USN-4038-4">https://ubuntu.com/security/notices/USN-4038-4</a><br><a href="https://ubuntu.com/security/notices/USN-4146-1">https://ubuntu.com/security/notices/USN-4146-1</a><br><a href="https://ubuntu.com/security/notices/USN-4146-2">https://ubuntu.com/security/notices/USN-4146-2</a><br><a href="https://usn.ubuntu.com/4038-1/">https://usn.ubuntu.com/4038-1/</a><br><a href="https://usn.ubuntu.com/4038-2/">https://usn.ubuntu.com/4038-2/</a><br><a href="https://usn.ubuntu.com/4146-1/">https://usn.ubuntu.com/4146-1/</a><br><a href="https://usn.ubuntu.com/4146-2/">https://usn.ubuntu.com/4146-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libbz2-dev | CVE-2019-12900 | CRITICAL | 1.0.6-8.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html</a><br><a href="http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html">http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html</a><br><a href="http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html">http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12900">https://access.redhat.com/security/cve/CVE-2019-12900</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494">https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900</a><br><a href="https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc">https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc</a><br><a href="https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E">https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E">https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">https://nvd.nist.gov/vuln/detail/CVE-2019-12900</a><br><a href="https://seclists.org/bugtraq/2019/Aug/4">https://seclists.org/bugtraq/2019/Aug/4</a><br><a href="https://seclists.org/bugtraq/2019/Jul/22">https://seclists.org/bugtraq/2019/Jul/22</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc</a><br><a href="https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4038-1">https://ubuntu.com/security/notices/USN-4038-1</a><br><a href="https://ubuntu.com/security/notices/USN-4038-2">https://ubuntu.com/security/notices/USN-4038-2</a><br><a href="https://ubuntu.com/security/notices/USN-4038-3">https://ubuntu.com/security/notices/USN-4038-3</a><br><a href="https://ubuntu.com/security/notices/USN-4038-4">https://ubuntu.com/security/notices/USN-4038-4</a><br><a href="https://ubuntu.com/security/notices/USN-4146-1">https://ubuntu.com/security/notices/USN-4146-1</a><br><a href="https://ubuntu.com/security/notices/USN-4146-2">https://ubuntu.com/security/notices/USN-4146-2</a><br><a href="https://usn.ubuntu.com/4038-1/">https://usn.ubuntu.com/4038-1/</a><br><a href="https://usn.ubuntu.com/4038-2/">https://usn.ubuntu.com/4038-2/</a><br><a href="https://usn.ubuntu.com/4146-1/">https://usn.ubuntu.com/4146-1/</a><br><a href="https://usn.ubuntu.com/4146-2/">https://usn.ubuntu.com/4146-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libc-bin | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/878159">http://bugs.debian.org/878159</a><br><a href="http://www.securityfocus.com/bid/102912">http://www.securityfocus.com/bid/102912</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3092">https://access.redhat.com/errata/RHSA-2018:3092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6485">https://access.redhat.com/security/cve/CVE-2018-6485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485</a><br><a href="https://linux.oracle.com/cve/CVE-2018-6485.html">https://linux.oracle.com/cve/CVE-2018-6485.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3092.html">https://linux.oracle.com/errata/ELSA-2018-3092.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22343">https://sourceware.org/bugzilla/show_bug.cgi?id=22343</a><br><a href="https://ubuntu.com/security/notices/USN-4218-1">https://ubuntu.com/security/notices/USN-4218-1</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4218-1/">https://usn.ubuntu.com/4218-1/</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a><br></details> |
| libc-bin | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6551">https://access.redhat.com/security/cve/CVE-2018-6551</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22774">https://sourceware.org/bugzilla/show_bug.cgi?id=22774</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22">https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22</a><br></details> |
| libc-bin | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9169">https://access.redhat.com/security/cve/CVE-2019-9169</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9169.html">https://linux.oracle.com/cve/CVE-2019-9169.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">https://nvd.nist.gov/vuln/detail/CVE-2019-9169</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24114">https://sourceware.org/bugzilla/show_bug.cgi?id=24114</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9</a><br><a href="https://support.f5.com/csp/article/K54823184">https://support.f5.com/csp/article/K54823184</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-bin | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2009-5155 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272">http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-5155">https://access.redhat.com/security/cve/CVE-2009-5155</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=11053">https://sourceware.org/bugzilla/show_bug.cgi?id=11053</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18986">https://sourceware.org/bugzilla/show_bug.cgi?id=18986</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672</a><br><a href="https://support.f5.com/csp/article/K64119434">https://support.f5.com/csp/article/K64119434</a><br><a href="https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br></details> |
| libc-bin | CVE-2018-1000001 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q1/38">http://seclists.org/oss-sec/2018/q1/38</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a><br><a href="http://www.securityfocus.com/bid/102525">http://www.securityfocus.com/bid/102525</a><br><a href="http://www.securitytracker.com/id/1040162">http://www.securitytracker.com/id/1040162</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000001">https://access.redhat.com/security/cve/CVE-2018-1000001</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001</a><br><a href="https://linux.oracle.com/cve/CVE-2018-1000001.html">https://linux.oracle.com/cve/CVE-2018-1000001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://lists.samba.org/archive/rsync/2018-February/031478.html">https://lists.samba.org/archive/rsync/2018-February/031478.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18203">https://sourceware.org/bugzilla/show_bug.cgi?id=18203</a><br><a href="https://ubuntu.com/security/notices/USN-3534-1">https://ubuntu.com/security/notices/USN-3534-1</a><br><a href="https://ubuntu.com/security/notices/USN-3536-1">https://ubuntu.com/security/notices/USN-3536-1</a><br><a href="https://usn.ubuntu.com/3534-1/">https://usn.ubuntu.com/3534-1/</a><br><a href="https://usn.ubuntu.com/3536-1/">https://usn.ubuntu.com/3536-1/</a><br><a href="https://www.exploit-db.com/exploits/43775/">https://www.exploit-db.com/exploits/43775/</a><br><a href="https://www.exploit-db.com/exploits/44889/">https://www.exploit-db.com/exploits/44889/</a><br><a href="https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/">https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/</a><br></details> |
| libc-bin | CVE-2020-1751 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-1752 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2021-3326 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3999 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html</a><br><a href="http://www.securityfocus.com/bid/106672">http://www.securityfocus.com/bid/106672</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2118">https://access.redhat.com/errata/RHSA-2019:2118</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3513">https://access.redhat.com/errata/RHSA-2019:3513</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10739">https://access.redhat.com/security/cve/CVE-2016-10739</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1347549">https://bugzilla.redhat.com/show_bug.cgi?id=1347549</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10739.html">https://linux.oracle.com/cve/CVE-2016-10739.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3513.html">https://linux.oracle.com/errata/ELSA-2019-3513.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">https://nvd.nist.gov/vuln/detail/CVE-2016-10739</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=20018">https://sourceware.org/bugzilla/show_bug.cgi?id=20018</a><br></details> |
| libc-bin | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100598">http://www.securityfocus.com/bid/100598</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12132">https://access.redhat.com/security/cve/CVE-2017-12132</a><br><a href="https://arxiv.org/pdf/1205.4011.pdf">https://arxiv.org/pdf/1205.4011.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12132.html">https://linux.oracle.com/cve/CVE-2017-12132.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21361">https://sourceware.org/bugzilla/show_bug.cgi?id=21361</a><br></details> |
| libc-bin | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3998 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2010-4756 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-bin | CVE-2015-8985 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/02/14/9">http://www.openwall.com/lists/oss-security/2017/02/14/9</a><br><a href="http://www.securityfocus.com/bid/76916">http://www.securityfocus.com/bid/76916</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-8985">https://access.redhat.com/security/cve/CVE-2015-8985</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985</a><br><a href="https://security.gentoo.org/glsa/201908-06">https://security.gentoo.org/glsa/201908-06</a><br></details> |
| libc-bin | CVE-2016-10228 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2018-20796 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2019-1010022 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-bin | CVE-2019-1010023 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-bin | CVE-2019-1010024 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-bin | CVE-2019-1010025 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-bin | CVE-2019-19126 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2019-6488 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106671">http://www.securityfocus.com/bid/106671</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6488">https://access.redhat.com/security/cve/CVE-2019-6488</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6488">https://nvd.nist.gov/vuln/detail/CVE-2019-6488</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24097">https://sourceware.org/bugzilla/show_bug.cgi?id=24097</a><br></details> |
| libc-bin | CVE-2019-7309 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106835">http://www.securityfocus.com/bid/106835</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7309">https://access.redhat.com/security/cve/CVE-2019-7309</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">https://nvd.nist.gov/vuln/detail/CVE-2019-7309</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24155">https://sourceware.org/bugzilla/show_bug.cgi?id=24155</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html">https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html</a><br></details> |
| libc-bin | CVE-2019-9192 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2020-6096 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-bin | CVE-2021-27645 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-dev-bin | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/878159">http://bugs.debian.org/878159</a><br><a href="http://www.securityfocus.com/bid/102912">http://www.securityfocus.com/bid/102912</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3092">https://access.redhat.com/errata/RHSA-2018:3092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6485">https://access.redhat.com/security/cve/CVE-2018-6485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485</a><br><a href="https://linux.oracle.com/cve/CVE-2018-6485.html">https://linux.oracle.com/cve/CVE-2018-6485.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3092.html">https://linux.oracle.com/errata/ELSA-2018-3092.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22343">https://sourceware.org/bugzilla/show_bug.cgi?id=22343</a><br><a href="https://ubuntu.com/security/notices/USN-4218-1">https://ubuntu.com/security/notices/USN-4218-1</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4218-1/">https://usn.ubuntu.com/4218-1/</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a><br></details> |
| libc-dev-bin | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6551">https://access.redhat.com/security/cve/CVE-2018-6551</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22774">https://sourceware.org/bugzilla/show_bug.cgi?id=22774</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22">https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22</a><br></details> |
| libc-dev-bin | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9169">https://access.redhat.com/security/cve/CVE-2019-9169</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9169.html">https://linux.oracle.com/cve/CVE-2019-9169.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">https://nvd.nist.gov/vuln/detail/CVE-2019-9169</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24114">https://sourceware.org/bugzilla/show_bug.cgi?id=24114</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9</a><br><a href="https://support.f5.com/csp/article/K54823184">https://support.f5.com/csp/article/K54823184</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-dev-bin | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-dev-bin | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-dev-bin | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-dev-bin | CVE-2009-5155 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272">http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-5155">https://access.redhat.com/security/cve/CVE-2009-5155</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=11053">https://sourceware.org/bugzilla/show_bug.cgi?id=11053</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18986">https://sourceware.org/bugzilla/show_bug.cgi?id=18986</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672</a><br><a href="https://support.f5.com/csp/article/K64119434">https://support.f5.com/csp/article/K64119434</a><br><a href="https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br></details> |
| libc-dev-bin | CVE-2018-1000001 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q1/38">http://seclists.org/oss-sec/2018/q1/38</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a><br><a href="http://www.securityfocus.com/bid/102525">http://www.securityfocus.com/bid/102525</a><br><a href="http://www.securitytracker.com/id/1040162">http://www.securitytracker.com/id/1040162</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000001">https://access.redhat.com/security/cve/CVE-2018-1000001</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001</a><br><a href="https://linux.oracle.com/cve/CVE-2018-1000001.html">https://linux.oracle.com/cve/CVE-2018-1000001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://lists.samba.org/archive/rsync/2018-February/031478.html">https://lists.samba.org/archive/rsync/2018-February/031478.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18203">https://sourceware.org/bugzilla/show_bug.cgi?id=18203</a><br><a href="https://ubuntu.com/security/notices/USN-3534-1">https://ubuntu.com/security/notices/USN-3534-1</a><br><a href="https://ubuntu.com/security/notices/USN-3536-1">https://ubuntu.com/security/notices/USN-3536-1</a><br><a href="https://usn.ubuntu.com/3534-1/">https://usn.ubuntu.com/3534-1/</a><br><a href="https://usn.ubuntu.com/3536-1/">https://usn.ubuntu.com/3536-1/</a><br><a href="https://www.exploit-db.com/exploits/43775/">https://www.exploit-db.com/exploits/43775/</a><br><a href="https://www.exploit-db.com/exploits/44889/">https://www.exploit-db.com/exploits/44889/</a><br><a href="https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/">https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/</a><br></details> |
| libc-dev-bin | CVE-2020-1751 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-dev-bin | CVE-2020-1752 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-dev-bin | CVE-2021-3326 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-dev-bin | CVE-2021-3999 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-dev-bin | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html</a><br><a href="http://www.securityfocus.com/bid/106672">http://www.securityfocus.com/bid/106672</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2118">https://access.redhat.com/errata/RHSA-2019:2118</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3513">https://access.redhat.com/errata/RHSA-2019:3513</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10739">https://access.redhat.com/security/cve/CVE-2016-10739</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1347549">https://bugzilla.redhat.com/show_bug.cgi?id=1347549</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10739.html">https://linux.oracle.com/cve/CVE-2016-10739.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3513.html">https://linux.oracle.com/errata/ELSA-2019-3513.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">https://nvd.nist.gov/vuln/detail/CVE-2016-10739</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=20018">https://sourceware.org/bugzilla/show_bug.cgi?id=20018</a><br></details> |
| libc-dev-bin | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100598">http://www.securityfocus.com/bid/100598</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12132">https://access.redhat.com/security/cve/CVE-2017-12132</a><br><a href="https://arxiv.org/pdf/1205.4011.pdf">https://arxiv.org/pdf/1205.4011.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12132.html">https://linux.oracle.com/cve/CVE-2017-12132.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21361">https://sourceware.org/bugzilla/show_bug.cgi?id=21361</a><br></details> |
| libc-dev-bin | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-dev-bin | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-dev-bin | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-dev-bin | CVE-2021-3998 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-dev-bin | CVE-2010-4756 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-dev-bin | CVE-2015-8985 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/02/14/9">http://www.openwall.com/lists/oss-security/2017/02/14/9</a><br><a href="http://www.securityfocus.com/bid/76916">http://www.securityfocus.com/bid/76916</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-8985">https://access.redhat.com/security/cve/CVE-2015-8985</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985</a><br><a href="https://security.gentoo.org/glsa/201908-06">https://security.gentoo.org/glsa/201908-06</a><br></details> |
| libc-dev-bin | CVE-2016-10228 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-dev-bin | CVE-2018-20796 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-dev-bin | CVE-2019-1010022 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-dev-bin | CVE-2019-1010023 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-dev-bin | CVE-2019-1010024 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-dev-bin | CVE-2019-1010025 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-dev-bin | CVE-2019-19126 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-dev-bin | CVE-2019-6488 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106671">http://www.securityfocus.com/bid/106671</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6488">https://access.redhat.com/security/cve/CVE-2019-6488</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6488">https://nvd.nist.gov/vuln/detail/CVE-2019-6488</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24097">https://sourceware.org/bugzilla/show_bug.cgi?id=24097</a><br></details> |
| libc-dev-bin | CVE-2019-7309 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106835">http://www.securityfocus.com/bid/106835</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7309">https://access.redhat.com/security/cve/CVE-2019-7309</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">https://nvd.nist.gov/vuln/detail/CVE-2019-7309</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24155">https://sourceware.org/bugzilla/show_bug.cgi?id=24155</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html">https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html</a><br></details> |
| libc-dev-bin | CVE-2019-9192 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-dev-bin | CVE-2020-6096 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-dev-bin | CVE-2021-27645 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/878159">http://bugs.debian.org/878159</a><br><a href="http://www.securityfocus.com/bid/102912">http://www.securityfocus.com/bid/102912</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3092">https://access.redhat.com/errata/RHSA-2018:3092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6485">https://access.redhat.com/security/cve/CVE-2018-6485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485</a><br><a href="https://linux.oracle.com/cve/CVE-2018-6485.html">https://linux.oracle.com/cve/CVE-2018-6485.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3092.html">https://linux.oracle.com/errata/ELSA-2018-3092.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22343">https://sourceware.org/bugzilla/show_bug.cgi?id=22343</a><br><a href="https://ubuntu.com/security/notices/USN-4218-1">https://ubuntu.com/security/notices/USN-4218-1</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4218-1/">https://usn.ubuntu.com/4218-1/</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a><br></details> |
| libc6 | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6551">https://access.redhat.com/security/cve/CVE-2018-6551</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22774">https://sourceware.org/bugzilla/show_bug.cgi?id=22774</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22">https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22</a><br></details> |
| libc6 | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9169">https://access.redhat.com/security/cve/CVE-2019-9169</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9169.html">https://linux.oracle.com/cve/CVE-2019-9169.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">https://nvd.nist.gov/vuln/detail/CVE-2019-9169</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24114">https://sourceware.org/bugzilla/show_bug.cgi?id=24114</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9</a><br><a href="https://support.f5.com/csp/article/K54823184">https://support.f5.com/csp/article/K54823184</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc6 | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2009-5155 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272">http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-5155">https://access.redhat.com/security/cve/CVE-2009-5155</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=11053">https://sourceware.org/bugzilla/show_bug.cgi?id=11053</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18986">https://sourceware.org/bugzilla/show_bug.cgi?id=18986</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672</a><br><a href="https://support.f5.com/csp/article/K64119434">https://support.f5.com/csp/article/K64119434</a><br><a href="https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br></details> |
| libc6 | CVE-2018-1000001 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q1/38">http://seclists.org/oss-sec/2018/q1/38</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a><br><a href="http://www.securityfocus.com/bid/102525">http://www.securityfocus.com/bid/102525</a><br><a href="http://www.securitytracker.com/id/1040162">http://www.securitytracker.com/id/1040162</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000001">https://access.redhat.com/security/cve/CVE-2018-1000001</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001</a><br><a href="https://linux.oracle.com/cve/CVE-2018-1000001.html">https://linux.oracle.com/cve/CVE-2018-1000001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://lists.samba.org/archive/rsync/2018-February/031478.html">https://lists.samba.org/archive/rsync/2018-February/031478.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18203">https://sourceware.org/bugzilla/show_bug.cgi?id=18203</a><br><a href="https://ubuntu.com/security/notices/USN-3534-1">https://ubuntu.com/security/notices/USN-3534-1</a><br><a href="https://ubuntu.com/security/notices/USN-3536-1">https://ubuntu.com/security/notices/USN-3536-1</a><br><a href="https://usn.ubuntu.com/3534-1/">https://usn.ubuntu.com/3534-1/</a><br><a href="https://usn.ubuntu.com/3536-1/">https://usn.ubuntu.com/3536-1/</a><br><a href="https://www.exploit-db.com/exploits/43775/">https://www.exploit-db.com/exploits/43775/</a><br><a href="https://www.exploit-db.com/exploits/44889/">https://www.exploit-db.com/exploits/44889/</a><br><a href="https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/">https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/</a><br></details> |
| libc6 | CVE-2020-1751 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-1752 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2021-3326 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3999 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html</a><br><a href="http://www.securityfocus.com/bid/106672">http://www.securityfocus.com/bid/106672</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2118">https://access.redhat.com/errata/RHSA-2019:2118</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3513">https://access.redhat.com/errata/RHSA-2019:3513</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10739">https://access.redhat.com/security/cve/CVE-2016-10739</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1347549">https://bugzilla.redhat.com/show_bug.cgi?id=1347549</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10739.html">https://linux.oracle.com/cve/CVE-2016-10739.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3513.html">https://linux.oracle.com/errata/ELSA-2019-3513.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">https://nvd.nist.gov/vuln/detail/CVE-2016-10739</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=20018">https://sourceware.org/bugzilla/show_bug.cgi?id=20018</a><br></details> |
| libc6 | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100598">http://www.securityfocus.com/bid/100598</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12132">https://access.redhat.com/security/cve/CVE-2017-12132</a><br><a href="https://arxiv.org/pdf/1205.4011.pdf">https://arxiv.org/pdf/1205.4011.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12132.html">https://linux.oracle.com/cve/CVE-2017-12132.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21361">https://sourceware.org/bugzilla/show_bug.cgi?id=21361</a><br></details> |
| libc6 | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3998 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2010-4756 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc6 | CVE-2015-8985 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/02/14/9">http://www.openwall.com/lists/oss-security/2017/02/14/9</a><br><a href="http://www.securityfocus.com/bid/76916">http://www.securityfocus.com/bid/76916</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-8985">https://access.redhat.com/security/cve/CVE-2015-8985</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985</a><br><a href="https://security.gentoo.org/glsa/201908-06">https://security.gentoo.org/glsa/201908-06</a><br></details> |
| libc6 | CVE-2016-10228 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2018-20796 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2019-1010022 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc6 | CVE-2019-1010023 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc6 | CVE-2019-1010024 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc6 | CVE-2019-1010025 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc6 | CVE-2019-19126 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2019-6488 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106671">http://www.securityfocus.com/bid/106671</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6488">https://access.redhat.com/security/cve/CVE-2019-6488</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6488">https://nvd.nist.gov/vuln/detail/CVE-2019-6488</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24097">https://sourceware.org/bugzilla/show_bug.cgi?id=24097</a><br></details> |
| libc6 | CVE-2019-7309 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106835">http://www.securityfocus.com/bid/106835</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7309">https://access.redhat.com/security/cve/CVE-2019-7309</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">https://nvd.nist.gov/vuln/detail/CVE-2019-7309</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24155">https://sourceware.org/bugzilla/show_bug.cgi?id=24155</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html">https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html</a><br></details> |
| libc6 | CVE-2019-9192 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2020-6096 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc6 | CVE-2021-27645 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6-dev | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/878159">http://bugs.debian.org/878159</a><br><a href="http://www.securityfocus.com/bid/102912">http://www.securityfocus.com/bid/102912</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3092">https://access.redhat.com/errata/RHSA-2018:3092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6485">https://access.redhat.com/security/cve/CVE-2018-6485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485</a><br><a href="https://linux.oracle.com/cve/CVE-2018-6485.html">https://linux.oracle.com/cve/CVE-2018-6485.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3092.html">https://linux.oracle.com/errata/ELSA-2018-3092.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22343">https://sourceware.org/bugzilla/show_bug.cgi?id=22343</a><br><a href="https://ubuntu.com/security/notices/USN-4218-1">https://ubuntu.com/security/notices/USN-4218-1</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4218-1/">https://usn.ubuntu.com/4218-1/</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a><br></details> |
| libc6-dev | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6551">https://access.redhat.com/security/cve/CVE-2018-6551</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22774">https://sourceware.org/bugzilla/show_bug.cgi?id=22774</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22">https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22</a><br></details> |
| libc6-dev | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9169">https://access.redhat.com/security/cve/CVE-2019-9169</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9169.html">https://linux.oracle.com/cve/CVE-2019-9169.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">https://nvd.nist.gov/vuln/detail/CVE-2019-9169</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24114">https://sourceware.org/bugzilla/show_bug.cgi?id=24114</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9</a><br><a href="https://support.f5.com/csp/article/K54823184">https://support.f5.com/csp/article/K54823184</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6-dev | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc6-dev | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6-dev | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6-dev | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6-dev | CVE-2009-5155 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272">http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-5155">https://access.redhat.com/security/cve/CVE-2009-5155</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=11053">https://sourceware.org/bugzilla/show_bug.cgi?id=11053</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18986">https://sourceware.org/bugzilla/show_bug.cgi?id=18986</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672</a><br><a href="https://support.f5.com/csp/article/K64119434">https://support.f5.com/csp/article/K64119434</a><br><a href="https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br></details> |
| libc6-dev | CVE-2018-1000001 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q1/38">http://seclists.org/oss-sec/2018/q1/38</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a><br><a href="http://www.securityfocus.com/bid/102525">http://www.securityfocus.com/bid/102525</a><br><a href="http://www.securitytracker.com/id/1040162">http://www.securitytracker.com/id/1040162</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000001">https://access.redhat.com/security/cve/CVE-2018-1000001</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001</a><br><a href="https://linux.oracle.com/cve/CVE-2018-1000001.html">https://linux.oracle.com/cve/CVE-2018-1000001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://lists.samba.org/archive/rsync/2018-February/031478.html">https://lists.samba.org/archive/rsync/2018-February/031478.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18203">https://sourceware.org/bugzilla/show_bug.cgi?id=18203</a><br><a href="https://ubuntu.com/security/notices/USN-3534-1">https://ubuntu.com/security/notices/USN-3534-1</a><br><a href="https://ubuntu.com/security/notices/USN-3536-1">https://ubuntu.com/security/notices/USN-3536-1</a><br><a href="https://usn.ubuntu.com/3534-1/">https://usn.ubuntu.com/3534-1/</a><br><a href="https://usn.ubuntu.com/3536-1/">https://usn.ubuntu.com/3536-1/</a><br><a href="https://www.exploit-db.com/exploits/43775/">https://www.exploit-db.com/exploits/43775/</a><br><a href="https://www.exploit-db.com/exploits/44889/">https://www.exploit-db.com/exploits/44889/</a><br><a href="https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/">https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/</a><br></details> |
| libc6-dev | CVE-2020-1751 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6-dev | CVE-2020-1752 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6-dev | CVE-2021-3326 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6-dev | CVE-2021-3999 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6-dev | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html</a><br><a href="http://www.securityfocus.com/bid/106672">http://www.securityfocus.com/bid/106672</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2118">https://access.redhat.com/errata/RHSA-2019:2118</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3513">https://access.redhat.com/errata/RHSA-2019:3513</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10739">https://access.redhat.com/security/cve/CVE-2016-10739</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1347549">https://bugzilla.redhat.com/show_bug.cgi?id=1347549</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10739.html">https://linux.oracle.com/cve/CVE-2016-10739.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3513.html">https://linux.oracle.com/errata/ELSA-2019-3513.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">https://nvd.nist.gov/vuln/detail/CVE-2016-10739</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=20018">https://sourceware.org/bugzilla/show_bug.cgi?id=20018</a><br></details> |
| libc6-dev | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100598">http://www.securityfocus.com/bid/100598</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12132">https://access.redhat.com/security/cve/CVE-2017-12132</a><br><a href="https://arxiv.org/pdf/1205.4011.pdf">https://arxiv.org/pdf/1205.4011.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12132.html">https://linux.oracle.com/cve/CVE-2017-12132.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21361">https://sourceware.org/bugzilla/show_bug.cgi?id=21361</a><br></details> |
| libc6-dev | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6-dev | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6-dev | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6-dev | CVE-2021-3998 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6-dev | CVE-2010-4756 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc6-dev | CVE-2015-8985 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/02/14/9">http://www.openwall.com/lists/oss-security/2017/02/14/9</a><br><a href="http://www.securityfocus.com/bid/76916">http://www.securityfocus.com/bid/76916</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-8985">https://access.redhat.com/security/cve/CVE-2015-8985</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985</a><br><a href="https://security.gentoo.org/glsa/201908-06">https://security.gentoo.org/glsa/201908-06</a><br></details> |
| libc6-dev | CVE-2016-10228 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6-dev | CVE-2018-20796 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6-dev | CVE-2019-1010022 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc6-dev | CVE-2019-1010023 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc6-dev | CVE-2019-1010024 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc6-dev | CVE-2019-1010025 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc6-dev | CVE-2019-19126 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6-dev | CVE-2019-6488 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106671">http://www.securityfocus.com/bid/106671</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6488">https://access.redhat.com/security/cve/CVE-2019-6488</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6488">https://nvd.nist.gov/vuln/detail/CVE-2019-6488</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24097">https://sourceware.org/bugzilla/show_bug.cgi?id=24097</a><br></details> |
| libc6-dev | CVE-2019-7309 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106835">http://www.securityfocus.com/bid/106835</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7309">https://access.redhat.com/security/cve/CVE-2019-7309</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">https://nvd.nist.gov/vuln/detail/CVE-2019-7309</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24155">https://sourceware.org/bugzilla/show_bug.cgi?id=24155</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html">https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html</a><br></details> |
| libc6-dev | CVE-2019-9192 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6-dev | CVE-2020-6096 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc6-dev | CVE-2021-27645 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libcairo-gobject2 | CVE-2017-7475 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2017/q2/151">http://seclists.org/oss-sec/2017/q2/151</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7475">https://access.redhat.com/security/cve/CVE-2017-7475</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=100763">https://bugs.freedesktop.org/show_bug.cgi?id=100763</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475</a><br><a href="https://github.com/advisories/GHSA-5v3f-73gv-x7x5">https://github.com/advisories/GHSA-5v3f-73gv-x7x5</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">https://nvd.nist.gov/vuln/detail/CVE-2017-7475</a><br></details> |
| libcairo-gobject2 | CVE-2017-9814 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9814">https://access.redhat.com/security/cve/CVE-2017-9814</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=101547">https://bugs.freedesktop.org/show_bug.cgi?id=101547</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/201904-01">https://security.gentoo.org/glsa/201904-01</a><br></details> |
| libcairo-gobject2 | CVE-2018-18064 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18064">https://access.redhat.com/security/cve/CVE-2018-18064</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/341">https://gitlab.freedesktop.org/cairo/cairo/issues/341</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libcairo-gobject2 | CVE-2019-6461 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6461">https://access.redhat.com/security/cve/CVE-2019-6461</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/352">https://gitlab.freedesktop.org/cairo/cairo/issues/352</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6461">https://nvd.nist.gov/vuln/detail/CVE-2019-6461</a><br></details> |
| libcairo-gobject2 | CVE-2019-6462 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6462">https://access.redhat.com/security/cve/CVE-2019-6462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/353">https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">https://nvd.nist.gov/vuln/detail/CVE-2019-6462</a><br></details> |
| libcairo-script-interpreter2 | CVE-2017-7475 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2017/q2/151">http://seclists.org/oss-sec/2017/q2/151</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7475">https://access.redhat.com/security/cve/CVE-2017-7475</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=100763">https://bugs.freedesktop.org/show_bug.cgi?id=100763</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475</a><br><a href="https://github.com/advisories/GHSA-5v3f-73gv-x7x5">https://github.com/advisories/GHSA-5v3f-73gv-x7x5</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">https://nvd.nist.gov/vuln/detail/CVE-2017-7475</a><br></details> |
| libcairo-script-interpreter2 | CVE-2017-9814 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9814">https://access.redhat.com/security/cve/CVE-2017-9814</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=101547">https://bugs.freedesktop.org/show_bug.cgi?id=101547</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/201904-01">https://security.gentoo.org/glsa/201904-01</a><br></details> |
| libcairo-script-interpreter2 | CVE-2018-18064 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18064">https://access.redhat.com/security/cve/CVE-2018-18064</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/341">https://gitlab.freedesktop.org/cairo/cairo/issues/341</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libcairo-script-interpreter2 | CVE-2019-6461 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6461">https://access.redhat.com/security/cve/CVE-2019-6461</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/352">https://gitlab.freedesktop.org/cairo/cairo/issues/352</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6461">https://nvd.nist.gov/vuln/detail/CVE-2019-6461</a><br></details> |
| libcairo-script-interpreter2 | CVE-2019-6462 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6462">https://access.redhat.com/security/cve/CVE-2019-6462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/353">https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">https://nvd.nist.gov/vuln/detail/CVE-2019-6462</a><br></details> |
| libcairo2 | CVE-2017-7475 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2017/q2/151">http://seclists.org/oss-sec/2017/q2/151</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7475">https://access.redhat.com/security/cve/CVE-2017-7475</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=100763">https://bugs.freedesktop.org/show_bug.cgi?id=100763</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475</a><br><a href="https://github.com/advisories/GHSA-5v3f-73gv-x7x5">https://github.com/advisories/GHSA-5v3f-73gv-x7x5</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">https://nvd.nist.gov/vuln/detail/CVE-2017-7475</a><br></details> |
| libcairo2 | CVE-2017-9814 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9814">https://access.redhat.com/security/cve/CVE-2017-9814</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=101547">https://bugs.freedesktop.org/show_bug.cgi?id=101547</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/201904-01">https://security.gentoo.org/glsa/201904-01</a><br></details> |
| libcairo2 | CVE-2018-18064 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18064">https://access.redhat.com/security/cve/CVE-2018-18064</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/341">https://gitlab.freedesktop.org/cairo/cairo/issues/341</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libcairo2 | CVE-2019-6461 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6461">https://access.redhat.com/security/cve/CVE-2019-6461</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/352">https://gitlab.freedesktop.org/cairo/cairo/issues/352</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6461">https://nvd.nist.gov/vuln/detail/CVE-2019-6461</a><br></details> |
| libcairo2 | CVE-2019-6462 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6462">https://access.redhat.com/security/cve/CVE-2019-6462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/353">https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">https://nvd.nist.gov/vuln/detail/CVE-2019-6462</a><br></details> |
| libcairo2-dev | CVE-2017-7475 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2017/q2/151">http://seclists.org/oss-sec/2017/q2/151</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7475">https://access.redhat.com/security/cve/CVE-2017-7475</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=100763">https://bugs.freedesktop.org/show_bug.cgi?id=100763</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475</a><br><a href="https://github.com/advisories/GHSA-5v3f-73gv-x7x5">https://github.com/advisories/GHSA-5v3f-73gv-x7x5</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">https://nvd.nist.gov/vuln/detail/CVE-2017-7475</a><br></details> |
| libcairo2-dev | CVE-2017-9814 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9814">https://access.redhat.com/security/cve/CVE-2017-9814</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=101547">https://bugs.freedesktop.org/show_bug.cgi?id=101547</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/201904-01">https://security.gentoo.org/glsa/201904-01</a><br></details> |
| libcairo2-dev | CVE-2018-18064 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18064">https://access.redhat.com/security/cve/CVE-2018-18064</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/341">https://gitlab.freedesktop.org/cairo/cairo/issues/341</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libcairo2-dev | CVE-2019-6461 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6461">https://access.redhat.com/security/cve/CVE-2019-6461</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/352">https://gitlab.freedesktop.org/cairo/cairo/issues/352</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6461">https://nvd.nist.gov/vuln/detail/CVE-2019-6461</a><br></details> |
| libcairo2-dev | CVE-2019-6462 | LOW | 1.14.8-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6462">https://access.redhat.com/security/cve/CVE-2019-6462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/353">https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">https://nvd.nist.gov/vuln/detail/CVE-2019-6462</a><br></details> |
| libcc1-0 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libcdt5 | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libcdt5 | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libcdt5 | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libcdt5 | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libcgraph6 | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libcgraph6 | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libcgraph6 | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libcgraph6 | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libcilkrts5 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libcroco3 | CVE-2017-8834 | LOW | 0.6.11-3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html</a><br><a href="http://seclists.org/fulldisclosure/2017/Jun/10">http://seclists.org/fulldisclosure/2017/Jun/10</a><br><a href="http://www.openwall.com/lists/oss-security/2020/08/13/3">http://www.openwall.com/lists/oss-security/2020/08/13/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-8834">https://access.redhat.com/security/cve/CVE-2017-8834</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=782647">https://bugzilla.gnome.org/show_bug.cgi?id=782647</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834</a><br><a href="https://www.exploit-db.com/exploits/42147/">https://www.exploit-db.com/exploits/42147/</a><br></details> |
| libcroco3 | CVE-2017-8871 | LOW | 0.6.11-3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html</a><br><a href="http://seclists.org/fulldisclosure/2017/Jun/10">http://seclists.org/fulldisclosure/2017/Jun/10</a><br><a href="http://www.openwall.com/lists/oss-security/2020/08/13/3">http://www.openwall.com/lists/oss-security/2020/08/13/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-8871">https://access.redhat.com/security/cve/CVE-2017-8871</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=782649">https://bugzilla.gnome.org/show_bug.cgi?id=782649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871</a><br><a href="https://www.exploit-db.com/exploits/42147/">https://www.exploit-db.com/exploits/42147/</a><br></details> |
| libcroco3 | CVE-2020-12825 | LOW | 0.6.11-3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/08/13/3">http://www.openwall.com/lists/oss-security/2020/08/13/3</a><br><a href="http://www.openwall.com/lists/oss-security/2020/09/08/3">http://www.openwall.com/lists/oss-security/2020/09/08/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-12825">https://access.redhat.com/security/cve/CVE-2020-12825</a><br><a href="https://gitlab.gnome.org/GNOME/libcroco/-/issues/8">https://gitlab.gnome.org/GNOME/libcroco/-/issues/8</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12825.html">https://linux.oracle.com/cve/CVE-2020-12825.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4072.html">https://linux.oracle.com/errata/ELSA-2020-4072.html</a><br></details> |
| libcups2 | CVE-2020-10001 | MEDIUM | 2.2.1-8+deb9u6 | 2.2.1-8+deb9u7 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-10001">https://access.redhat.com/security/cve/CVE-2020-10001</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10001.html">https://linux.oracle.com/cve/CVE-2020-10001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4393.html">https://linux.oracle.com/errata/ELSA-2021-4393.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html</a><br><a href="https://support.apple.com/en-us/HT212011">https://support.apple.com/en-us/HT212011</a><br></details> |
| libcups2 | CVE-2014-8166 | LOW | 2.2.1-8+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2015/03/24/15">http://www.openwall.com/lists/oss-security/2015/03/24/15</a><br><a href="http://www.openwall.com/lists/oss-security/2015/03/24/2">http://www.openwall.com/lists/oss-security/2015/03/24/2</a><br><a href="http://www.securityfocus.com/bid/73300">http://www.securityfocus.com/bid/73300</a><br><a href="https://access.redhat.com/security/cve/CVE-2014-8166">https://access.redhat.com/security/cve/CVE-2014-8166</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1084577">https://bugzilla.redhat.com/show_bug.cgi?id=1084577</a><br></details> |
| libcurl3 | CVE-2021-22946 | HIGH | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3 | CVE-2021-22876 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u14 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22876">https://access.redhat.com/security/cve/CVE-2021-22876</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22876.html">https://curl.se/docs/CVE-2021-22876.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876</a><br><a href="https://hackerone.com/reports/1101882">https://hackerone.com/reports/1101882</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22876.html">https://linux.oracle.com/cve/CVE-2021-22876.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/</a><br><a href="https://security.gentoo.org/glsa/202105-36">https://security.gentoo.org/glsa/202105-36</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0007/">https://security.netapp.com/advisory/ntap-20210521-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4898-1">https://ubuntu.com/security/notices/USN-4898-1</a><br><a href="https://ubuntu.com/security/notices/USN-4903-1">https://ubuntu.com/security/notices/USN-4903-1</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br></details> |
| libcurl3 | CVE-2021-22947 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3 | CVE-2021-22898 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl3 | CVE-2021-22922 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3 | CVE-2021-22923 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3 | CVE-2021-22924 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22946 | HIGH | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22876 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u14 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22876">https://access.redhat.com/security/cve/CVE-2021-22876</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22876.html">https://curl.se/docs/CVE-2021-22876.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876</a><br><a href="https://hackerone.com/reports/1101882">https://hackerone.com/reports/1101882</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22876.html">https://linux.oracle.com/cve/CVE-2021-22876.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/</a><br><a href="https://security.gentoo.org/glsa/202105-36">https://security.gentoo.org/glsa/202105-36</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0007/">https://security.netapp.com/advisory/ntap-20210521-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4898-1">https://ubuntu.com/security/notices/USN-4898-1</a><br><a href="https://ubuntu.com/security/notices/USN-4903-1">https://ubuntu.com/security/notices/USN-4903-1</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22898 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22922 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22923 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl3-gnutls | CVE-2021-22924 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22946 | HIGH | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22876 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u14 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22876">https://access.redhat.com/security/cve/CVE-2021-22876</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22876.html">https://curl.se/docs/CVE-2021-22876.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876</a><br><a href="https://hackerone.com/reports/1101882">https://hackerone.com/reports/1101882</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22876.html">https://linux.oracle.com/cve/CVE-2021-22876.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/</a><br><a href="https://security.gentoo.org/glsa/202105-36">https://security.gentoo.org/glsa/202105-36</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0007/">https://security.netapp.com/advisory/ntap-20210521-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4898-1">https://ubuntu.com/security/notices/USN-4898-1</a><br><a href="https://ubuntu.com/security/notices/USN-4903-1">https://ubuntu.com/security/notices/USN-4903-1</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22947 | MEDIUM | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u16 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22898 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22922 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22923 | LOW | 7.52.1-5+deb9u13 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4-openssl-dev | CVE-2021-22924 | LOW | 7.52.1-5+deb9u13 | 7.52.1-5+deb9u15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libdjvulibre-dev | CVE-2019-18804 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804</a><br><a href="https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md">https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/</a><br><a href="https://sourceforge.net/p/djvu/bugs/309/">https://sourceforge.net/p/djvu/bugs/309/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2021-32490 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943693">https://bugzilla.redhat.com/show_bug.cgi?id=1943693</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2021-32491 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943409">https://bugzilla.redhat.com/show_bug.cgi?id=1943409</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943684">https://bugzilla.redhat.com/show_bug.cgi?id=1943684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2021-32492 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943686">https://bugzilla.redhat.com/show_bug.cgi?id=1943686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2021-32493 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943690">https://bugzilla.redhat.com/show_bug.cgi?id=1943690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2021-3500 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943685">https://bugzilla.redhat.com/show_bug.cgi?id=1943685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2019-15142 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/296/">https://sourceforge.net/p/djvu/bugs/296/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/">https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2019-15143 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/297/">https://sourceforge.net/p/djvu/bugs/297/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/">https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2019-15144 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/299/">https://sourceforge.net/p/djvu/bugs/299/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/">https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2019-15145 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/298/">https://sourceforge.net/p/djvu/bugs/298/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/">https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-dev | CVE-2021-3630 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u2 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1977427">https://bugzilla.redhat.com/show_bug.cgi?id=1977427</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/</a><br><a href="https://sourceforge.net/p/djvu/bugs/302/">https://sourceforge.net/p/djvu/bugs/302/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/">https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/</a><br><a href="https://ubuntu.com/security/notices/USN-5005-1">https://ubuntu.com/security/notices/USN-5005-1</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2019-18804 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804</a><br><a href="https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md">https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/</a><br><a href="https://sourceforge.net/p/djvu/bugs/309/">https://sourceforge.net/p/djvu/bugs/309/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2021-32490 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943693">https://bugzilla.redhat.com/show_bug.cgi?id=1943693</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2021-32491 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943409">https://bugzilla.redhat.com/show_bug.cgi?id=1943409</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943684">https://bugzilla.redhat.com/show_bug.cgi?id=1943684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2021-32492 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943686">https://bugzilla.redhat.com/show_bug.cgi?id=1943686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2021-32493 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943690">https://bugzilla.redhat.com/show_bug.cgi?id=1943690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2021-3500 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943685">https://bugzilla.redhat.com/show_bug.cgi?id=1943685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2019-15142 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/296/">https://sourceforge.net/p/djvu/bugs/296/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/">https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2019-15143 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/297/">https://sourceforge.net/p/djvu/bugs/297/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/">https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2019-15144 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/299/">https://sourceforge.net/p/djvu/bugs/299/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/">https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2019-15145 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/298/">https://sourceforge.net/p/djvu/bugs/298/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/">https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre-text | CVE-2021-3630 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u2 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1977427">https://bugzilla.redhat.com/show_bug.cgi?id=1977427</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/</a><br><a href="https://sourceforge.net/p/djvu/bugs/302/">https://sourceforge.net/p/djvu/bugs/302/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/">https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/</a><br><a href="https://ubuntu.com/security/notices/USN-5005-1">https://ubuntu.com/security/notices/USN-5005-1</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2019-18804 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804</a><br><a href="https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md">https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/</a><br><a href="https://sourceforge.net/p/djvu/bugs/309/">https://sourceforge.net/p/djvu/bugs/309/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2021-32490 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943693">https://bugzilla.redhat.com/show_bug.cgi?id=1943693</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2021-32491 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943409">https://bugzilla.redhat.com/show_bug.cgi?id=1943409</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943684">https://bugzilla.redhat.com/show_bug.cgi?id=1943684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2021-32492 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943686">https://bugzilla.redhat.com/show_bug.cgi?id=1943686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2021-32493 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943690">https://bugzilla.redhat.com/show_bug.cgi?id=1943690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2021-3500 | HIGH | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1943685">https://bugzilla.redhat.com/show_bug.cgi?id=1943685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500</a><br><a href="https://ubuntu.com/security/notices/USN-4957-1">https://ubuntu.com/security/notices/USN-4957-1</a><br><a href="https://ubuntu.com/security/notices/USN-4957-2">https://ubuntu.com/security/notices/USN-4957-2</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2019-15142 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/296/">https://sourceforge.net/p/djvu/bugs/296/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/">https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2019-15143 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/297/">https://sourceforge.net/p/djvu/bugs/297/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/">https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2019-15144 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/299/">https://sourceforge.net/p/djvu/bugs/299/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/">https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2019-15145 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/</a><br><a href="https://security.gentoo.org/glsa/202007-36">https://security.gentoo.org/glsa/202007-36</a><br><a href="https://sourceforge.net/p/djvu/bugs/298/">https://sourceforge.net/p/djvu/bugs/298/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/">https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/</a><br><a href="https://ubuntu.com/security/notices/USN-4198-1">https://ubuntu.com/security/notices/USN-4198-1</a><br><a href="https://usn.ubuntu.com/4198-1/">https://usn.ubuntu.com/4198-1/</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libdjvulibre21 | CVE-2021-3630 | MEDIUM | 3.5.27.1-7 | 3.5.27.1-7+deb9u2 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1977427">https://bugzilla.redhat.com/show_bug.cgi?id=1977427</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/</a><br><a href="https://sourceforge.net/p/djvu/bugs/302/">https://sourceforge.net/p/djvu/bugs/302/</a><br><a href="https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/">https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/</a><br><a href="https://ubuntu.com/security/notices/USN-5005-1">https://ubuntu.com/security/notices/USN-5005-1</a><br><a href="https://www.debian.org/security/2021/dsa-5032">https://www.debian.org/security/2021/dsa-5032</a><br></details> |
| libelf1 | CVE-2018-16402 | CRITICAL | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16402">https://access.redhat.com/security/cve/CVE-2018-16402</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16402.html">https://linux.oracle.com/cve/CVE-2018-16402.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2197.html">https://linux.oracle.com/errata/ELSA-2019-2197.html</a><br><a href="https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23528">https://sourceware.org/bugzilla/show_bug.cgi?id=23528</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2018-16062 | MEDIUM | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16062">https://access.redhat.com/security/cve/CVE-2018-16062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16062.html">https://linux.oracle.com/cve/CVE-2018-16062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2197.html">https://linux.oracle.com/errata/ELSA-2019-2197.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23541">https://sourceware.org/bugzilla/show_bug.cgi?id=23541</a><br><a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9">https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2018-18310 | MEDIUM | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18310">https://access.redhat.com/security/cve/CVE-2018-18310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18310.html">https://linux.oracle.com/cve/CVE-2018-18310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2197.html">https://linux.oracle.com/errata/ELSA-2019-2197.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23752">https://sourceware.org/bugzilla/show_bug.cgi?id=23752</a><br><a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2018-18520 | MEDIUM | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18520">https://access.redhat.com/security/cve/CVE-2018-18520</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18520.html">https://linux.oracle.com/cve/CVE-2018-18520.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2197.html">https://linux.oracle.com/errata/ELSA-2019-2197.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23787">https://sourceware.org/bugzilla/show_bug.cgi?id=23787</a><br><a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2018-18521 | MEDIUM | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18521">https://access.redhat.com/security/cve/CVE-2018-18521</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18521.html">https://linux.oracle.com/cve/CVE-2018-18521.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2197.html">https://linux.oracle.com/errata/ELSA-2019-2197.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23786">https://sourceware.org/bugzilla/show_bug.cgi?id=23786</a><br><a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2019-7150 | MEDIUM | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3575">https://access.redhat.com/errata/RHSA-2019:3575</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7150">https://access.redhat.com/security/cve/CVE-2019-7150</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7150.html">https://linux.oracle.com/cve/CVE-2019-7150.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3575.html">https://linux.oracle.com/errata/ELSA-2019-3575.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24103">https://sourceware.org/bugzilla/show_bug.cgi?id=24103</a><br><a href="https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html">https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2019-7665 | MEDIUM | 0.168-1 | 0.168-1+deb9u1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3575">https://access.redhat.com/errata/RHSA-2019:3575</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7665">https://access.redhat.com/security/cve/CVE-2019-7665</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7665.html">https://linux.oracle.com/cve/CVE-2019-7665.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3575.html">https://linux.oracle.com/errata/ELSA-2019-3575.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24089">https://sourceware.org/bugzilla/show_bug.cgi?id=24089</a><br><a href="https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html">https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2018-16403 | LOW | 0.168-1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16403">https://access.redhat.com/security/cve/CVE-2018-16403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16403.html">https://linux.oracle.com/cve/CVE-2018-16403.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2197.html">https://linux.oracle.com/errata/ELSA-2019-2197.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23529">https://sourceware.org/bugzilla/show_bug.cgi?id=23529</a><br><a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=6983e59b727458a6c64d9659c85f08218bc4fcda">https://sourceware.org/git/?p=elfutils.git;a=commit;h=6983e59b727458a6c64d9659c85f08218bc4fcda</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libelf1 | CVE-2019-7148 | LOW | 0.168-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-7148">https://access.redhat.com/security/cve/CVE-2019-7148</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24085">https://sourceware.org/bugzilla/show_bug.cgi?id=24085</a><br></details> |
| libelf1 | CVE-2019-7149 | LOW | 0.168-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/errata/RHSA-2019:2197">https://access.redhat.com/errata/RHSA-2019:2197</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3575">https://access.redhat.com/errata/RHSA-2019:3575</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7149">https://access.redhat.com/security/cve/CVE-2019-7149</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7149.html">https://linux.oracle.com/cve/CVE-2019-7149.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3575.html">https://linux.oracle.com/errata/ELSA-2019-3575.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24102">https://sourceware.org/bugzilla/show_bug.cgi?id=24102</a><br><a href="https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html">https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html</a><br><a href="https://ubuntu.com/security/notices/USN-4012-1">https://ubuntu.com/security/notices/USN-4012-1</a><br><a href="https://usn.ubuntu.com/4012-1/">https://usn.ubuntu.com/4012-1/</a><br></details> |
| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22822">https://access.redhat.com/security/cve/CVE-2022-22822</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22822.html">https://linux.oracle.com/cve/CVE-2022-22822.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">https://nvd.nist.gov/vuln/detail/CVE-2022-22822</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22823">https://access.redhat.com/security/cve/CVE-2022-22823</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22823.html">https://linux.oracle.com/cve/CVE-2022-22823.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">https://nvd.nist.gov/vuln/detail/CVE-2022-22823</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22824">https://access.redhat.com/security/cve/CVE-2022-22824</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22824.html">https://linux.oracle.com/cve/CVE-2022-22824.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">https://nvd.nist.gov/vuln/detail/CVE-2022-22824</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23852">https://access.redhat.com/security/cve/CVE-2022-23852</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852</a><br><a href="https://github.com/libexpat/libexpat/pull/550">https://github.com/libexpat/libexpat/pull/550</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23852.html">https://linux.oracle.com/cve/CVE-2022-23852.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">https://nvd.nist.gov/vuln/detail/CVE-2022-23852</a><br><a href="https://security.netapp.com/advisory/ntap-20220217-0001/">https://security.netapp.com/advisory/ntap-20220217-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23990">https://access.redhat.com/security/cve/CVE-2022-23990</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990</a><br><a href="https://github.com/libexpat/libexpat/pull/551">https://github.com/libexpat/libexpat/pull/551</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23990.html">https://linux.oracle.com/cve/CVE-2022-23990.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9232.html">https://linux.oracle.com/errata/ELSA-2022-9232.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">https://nvd.nist.gov/vuln/detail/CVE-2022-23990</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-25235 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25235">https://access.redhat.com/security/cve/CVE-2022-25235</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25235.html">https://linux.oracle.com/cve/CVE-2022-25235.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">https://nvd.nist.gov/vuln/detail/CVE-2022-25235</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2022-25236 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25236">https://access.redhat.com/security/cve/CVE-2022-25236</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/577">https://github.com/libexpat/libexpat/pull/577</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25236.html">https://linux.oracle.com/cve/CVE-2022-25236.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">https://nvd.nist.gov/vuln/detail/CVE-2022-25236</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2022-25315 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25315">https://access.redhat.com/security/cve/CVE-2022-25315</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315</a><br><a href="https://github.com/libexpat/libexpat/pull/559">https://github.com/libexpat/libexpat/pull/559</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25315.html">https://linux.oracle.com/cve/CVE-2022-25315.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">https://nvd.nist.gov/vuln/detail/CVE-2022-25315</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2021-45960 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-45960">https://access.redhat.com/security/cve/CVE-2021-45960</a><br><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1217609">https://bugzilla.mozilla.org/show_bug.cgi?id=1217609</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960</a><br><a href="https://github.com/libexpat/libexpat/issues/531">https://github.com/libexpat/libexpat/issues/531</a><br><a href="https://github.com/libexpat/libexpat/pull/534">https://github.com/libexpat/libexpat/pull/534</a><br><a href="https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea">https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea</a><br><a href="https://linux.oracle.com/cve/CVE-2021-45960.html">https://linux.oracle.com/cve/CVE-2021-45960.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">https://nvd.nist.gov/vuln/detail/CVE-2021-45960</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0004/">https://security.netapp.com/advisory/ntap-20220121-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2021-46143 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-46143">https://access.redhat.com/security/cve/CVE-2021-46143</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143</a><br><a href="https://github.com/libexpat/libexpat/issues/532">https://github.com/libexpat/libexpat/issues/532</a><br><a href="https://github.com/libexpat/libexpat/pull/538">https://github.com/libexpat/libexpat/pull/538</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46143.html">https://linux.oracle.com/cve/CVE-2021-46143.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9227.html">https://linux.oracle.com/errata/ELSA-2022-9227.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">https://nvd.nist.gov/vuln/detail/CVE-2021-46143</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0006/">https://security.netapp.com/advisory/ntap-20220121-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22825 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22825">https://access.redhat.com/security/cve/CVE-2022-22825</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22825.html">https://linux.oracle.com/cve/CVE-2022-22825.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">https://nvd.nist.gov/vuln/detail/CVE-2022-22825</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22826 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22826">https://access.redhat.com/security/cve/CVE-2022-22826</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22826.html">https://linux.oracle.com/cve/CVE-2022-22826.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">https://nvd.nist.gov/vuln/detail/CVE-2022-22826</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22827 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22827">https://access.redhat.com/security/cve/CVE-2022-22827</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22827.html">https://linux.oracle.com/cve/CVE-2022-22827.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">https://nvd.nist.gov/vuln/detail/CVE-2022-22827</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-25313 | MEDIUM | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25313">https://access.redhat.com/security/cve/CVE-2022-25313</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313</a><br><a href="https://github.com/libexpat/libexpat/pull/558">https://github.com/libexpat/libexpat/pull/558</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">https://nvd.nist.gov/vuln/detail/CVE-2022-25313</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2013-0340 | LOW | 2.2.0-2+deb9u3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2013/02/22/3">http://openwall.com/lists/oss-security/2013/02/22/3</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/61">http://seclists.org/fulldisclosure/2021/Oct/61</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/62">http://seclists.org/fulldisclosure/2021/Oct/62</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/63">http://seclists.org/fulldisclosure/2021/Oct/63</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/33">http://seclists.org/fulldisclosure/2021/Sep/33</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/34">http://seclists.org/fulldisclosure/2021/Sep/34</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/35">http://seclists.org/fulldisclosure/2021/Sep/35</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/38">http://seclists.org/fulldisclosure/2021/Sep/38</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/39">http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/40">http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href="http://securitytracker.com/id?1028213">http://securitytracker.com/id?1028213</a><br><a href="http://www.openwall.com/lists/oss-security/2013/04/12/6">http://www.openwall.com/lists/oss-security/2013/04/12/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/07/4">http://www.openwall.com/lists/oss-security/2021/10/07/4</a><br><a href="http://www.osvdb.org/90634">http://www.osvdb.org/90634</a><br><a href="http://www.securityfocus.com/bid/58233">http://www.securityfocus.com/bid/58233</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-0340">https://access.redhat.com/security/cve/CVE-2013-0340</a><br><a href="https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E">https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">https://nvd.nist.gov/vuln/detail/CVE-2013-0340</a><br><a href="https://security.gentoo.org/glsa/201701-21">https://security.gentoo.org/glsa/201701-21</a><br><a href="https://support.apple.com/kb/HT212804">https://support.apple.com/kb/HT212804</a><br><a href="https://support.apple.com/kb/HT212805">https://support.apple.com/kb/HT212805</a><br><a href="https://support.apple.com/kb/HT212807">https://support.apple.com/kb/HT212807</a><br><a href="https://support.apple.com/kb/HT212814">https://support.apple.com/kb/HT212814</a><br><a href="https://support.apple.com/kb/HT212815">https://support.apple.com/kb/HT212815</a><br><a href="https://support.apple.com/kb/HT212819">https://support.apple.com/kb/HT212819</a><br></details> |
| libexpat1-dev | CVE-2022-22822 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22822">https://access.redhat.com/security/cve/CVE-2022-22822</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22822.html">https://linux.oracle.com/cve/CVE-2022-22822.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">https://nvd.nist.gov/vuln/detail/CVE-2022-22822</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-22823 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22823">https://access.redhat.com/security/cve/CVE-2022-22823</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22823.html">https://linux.oracle.com/cve/CVE-2022-22823.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">https://nvd.nist.gov/vuln/detail/CVE-2022-22823</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-22824 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22824">https://access.redhat.com/security/cve/CVE-2022-22824</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22824.html">https://linux.oracle.com/cve/CVE-2022-22824.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">https://nvd.nist.gov/vuln/detail/CVE-2022-22824</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-23852 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23852">https://access.redhat.com/security/cve/CVE-2022-23852</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852</a><br><a href="https://github.com/libexpat/libexpat/pull/550">https://github.com/libexpat/libexpat/pull/550</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23852.html">https://linux.oracle.com/cve/CVE-2022-23852.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">https://nvd.nist.gov/vuln/detail/CVE-2022-23852</a><br><a href="https://security.netapp.com/advisory/ntap-20220217-0001/">https://security.netapp.com/advisory/ntap-20220217-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-23990 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23990">https://access.redhat.com/security/cve/CVE-2022-23990</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990</a><br><a href="https://github.com/libexpat/libexpat/pull/551">https://github.com/libexpat/libexpat/pull/551</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23990.html">https://linux.oracle.com/cve/CVE-2022-23990.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9232.html">https://linux.oracle.com/errata/ELSA-2022-9232.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">https://nvd.nist.gov/vuln/detail/CVE-2022-23990</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-25235 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25235">https://access.redhat.com/security/cve/CVE-2022-25235</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25235.html">https://linux.oracle.com/cve/CVE-2022-25235.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">https://nvd.nist.gov/vuln/detail/CVE-2022-25235</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1-dev | CVE-2022-25236 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25236">https://access.redhat.com/security/cve/CVE-2022-25236</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/577">https://github.com/libexpat/libexpat/pull/577</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25236.html">https://linux.oracle.com/cve/CVE-2022-25236.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">https://nvd.nist.gov/vuln/detail/CVE-2022-25236</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1-dev | CVE-2022-25315 | CRITICAL | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25315">https://access.redhat.com/security/cve/CVE-2022-25315</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315</a><br><a href="https://github.com/libexpat/libexpat/pull/559">https://github.com/libexpat/libexpat/pull/559</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25315.html">https://linux.oracle.com/cve/CVE-2022-25315.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">https://nvd.nist.gov/vuln/detail/CVE-2022-25315</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1-dev | CVE-2021-45960 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-45960">https://access.redhat.com/security/cve/CVE-2021-45960</a><br><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1217609">https://bugzilla.mozilla.org/show_bug.cgi?id=1217609</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960</a><br><a href="https://github.com/libexpat/libexpat/issues/531">https://github.com/libexpat/libexpat/issues/531</a><br><a href="https://github.com/libexpat/libexpat/pull/534">https://github.com/libexpat/libexpat/pull/534</a><br><a href="https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea">https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea</a><br><a href="https://linux.oracle.com/cve/CVE-2021-45960.html">https://linux.oracle.com/cve/CVE-2021-45960.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">https://nvd.nist.gov/vuln/detail/CVE-2021-45960</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0004/">https://security.netapp.com/advisory/ntap-20220121-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2021-46143 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-46143">https://access.redhat.com/security/cve/CVE-2021-46143</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143</a><br><a href="https://github.com/libexpat/libexpat/issues/532">https://github.com/libexpat/libexpat/issues/532</a><br><a href="https://github.com/libexpat/libexpat/pull/538">https://github.com/libexpat/libexpat/pull/538</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46143.html">https://linux.oracle.com/cve/CVE-2021-46143.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9227.html">https://linux.oracle.com/errata/ELSA-2022-9227.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">https://nvd.nist.gov/vuln/detail/CVE-2021-46143</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0006/">https://security.netapp.com/advisory/ntap-20220121-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-22825 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22825">https://access.redhat.com/security/cve/CVE-2022-22825</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22825.html">https://linux.oracle.com/cve/CVE-2022-22825.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">https://nvd.nist.gov/vuln/detail/CVE-2022-22825</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-22826 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22826">https://access.redhat.com/security/cve/CVE-2022-22826</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22826.html">https://linux.oracle.com/cve/CVE-2022-22826.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">https://nvd.nist.gov/vuln/detail/CVE-2022-22826</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-22827 | HIGH | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22827">https://access.redhat.com/security/cve/CVE-2022-22827</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22827.html">https://linux.oracle.com/cve/CVE-2022-22827.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">https://nvd.nist.gov/vuln/detail/CVE-2022-22827</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1-dev | CVE-2022-25313 | MEDIUM | 2.2.0-2+deb9u3 | 2.2.0-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25313">https://access.redhat.com/security/cve/CVE-2022-25313</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313</a><br><a href="https://github.com/libexpat/libexpat/pull/558">https://github.com/libexpat/libexpat/pull/558</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">https://nvd.nist.gov/vuln/detail/CVE-2022-25313</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1-dev | CVE-2013-0340 | LOW | 2.2.0-2+deb9u3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2013/02/22/3">http://openwall.com/lists/oss-security/2013/02/22/3</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/61">http://seclists.org/fulldisclosure/2021/Oct/61</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/62">http://seclists.org/fulldisclosure/2021/Oct/62</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/63">http://seclists.org/fulldisclosure/2021/Oct/63</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/33">http://seclists.org/fulldisclosure/2021/Sep/33</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/34">http://seclists.org/fulldisclosure/2021/Sep/34</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/35">http://seclists.org/fulldisclosure/2021/Sep/35</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/38">http://seclists.org/fulldisclosure/2021/Sep/38</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/39">http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/40">http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href="http://securitytracker.com/id?1028213">http://securitytracker.com/id?1028213</a><br><a href="http://www.openwall.com/lists/oss-security/2013/04/12/6">http://www.openwall.com/lists/oss-security/2013/04/12/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/07/4">http://www.openwall.com/lists/oss-security/2021/10/07/4</a><br><a href="http://www.osvdb.org/90634">http://www.osvdb.org/90634</a><br><a href="http://www.securityfocus.com/bid/58233">http://www.securityfocus.com/bid/58233</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-0340">https://access.redhat.com/security/cve/CVE-2013-0340</a><br><a href="https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E">https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">https://nvd.nist.gov/vuln/detail/CVE-2013-0340</a><br><a href="https://security.gentoo.org/glsa/201701-21">https://security.gentoo.org/glsa/201701-21</a><br><a href="https://support.apple.com/kb/HT212804">https://support.apple.com/kb/HT212804</a><br><a href="https://support.apple.com/kb/HT212805">https://support.apple.com/kb/HT212805</a><br><a href="https://support.apple.com/kb/HT212807">https://support.apple.com/kb/HT212807</a><br><a href="https://support.apple.com/kb/HT212814">https://support.apple.com/kb/HT212814</a><br><a href="https://support.apple.com/kb/HT212815">https://support.apple.com/kb/HT212815</a><br><a href="https://support.apple.com/kb/HT212819">https://support.apple.com/kb/HT212819</a><br></details> |
| libfdisk1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| libfdisk1 | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libfdisk1 | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libgcc-6-dev | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcc1 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.7.6-2+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33560">https://access.redhat.com/security/cve/CVE-2021-33560</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href="https://dev.gnupg.org/T5305">https://dev.gnupg.org/T5305</a><br><a href="https://dev.gnupg.org/T5328">https://dev.gnupg.org/T5328</a><br><a href="https://dev.gnupg.org/T5466">https://dev.gnupg.org/T5466</a><br><a href="https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61">https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33560.html">https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4409.html">https://linux.oracle.com/errata/ELSA-2021-4409.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">https://nvd.nist.gov/vuln/detail/CVE-2021-33560</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.7.6-2+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/10/02/2">http://www.openwall.com/lists/oss-security/2019/10/02/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13627">https://access.redhat.com/security/cve/CVE-2019-13627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</a><br><a href="https://dev.gnupg.org/T4683">https://dev.gnupg.org/T4683</a><br><a href="https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5">https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13627.html">https://linux.oracle.com/cve/CVE-2019-13627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4482.html">https://linux.oracle.com/errata/ELSA-2020-4482.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html</a><br><a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">https://security-tracker.debian.org/tracker/CVE-2019-13627</a><br><a href="https://security.gentoo.org/glsa/202003-32">https://security.gentoo.org/glsa/202003-32</a><br><a href="https://ubuntu.com/security/notices/USN-4236-1">https://ubuntu.com/security/notices/USN-4236-1</a><br><a href="https://ubuntu.com/security/notices/USN-4236-2">https://ubuntu.com/security/notices/USN-4236-2</a><br><a href="https://ubuntu.com/security/notices/USN-4236-3">https://ubuntu.com/security/notices/USN-4236-3</a><br><a href="https://usn.ubuntu.com/4236-1/">https://usn.ubuntu.com/4236-1/</a><br><a href="https://usn.ubuntu.com/4236-2/">https://usn.ubuntu.com/4236-2/</a><br><a href="https://usn.ubuntu.com/4236-3/">https://usn.ubuntu.com/4236-3/</a><br></details> |
| libgcrypt20 | CVE-2021-40528 | MEDIUM | 1.7.6-2+deb9u3 | 1.7.6-2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-40528">https://access.redhat.com/security/cve/CVE-2021-40528</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528</a><br><a href="https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13">https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320">https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320</a><br><a href="https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1">https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1</a><br><a href="https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2">https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">https://nvd.nist.gov/vuln/detail/CVE-2021-40528</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br></details> |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.7.6-2+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6829">https://access.redhat.com/security/cve/CVE-2018-6829</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a><br><a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libgd3 | CVE-2017-6363 | HIGH | 2.2.4-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363</a><br><a href="https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c">https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c</a><br><a href="https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397">https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397</a><br><a href="https://github.com/libgd/libgd/issues/383">https://github.com/libgd/libgd/issues/383</a><br><a href="https://ubuntu.com/security/notices/USN-5068-1">https://ubuntu.com/security/notices/USN-5068-1</a><br></details> |
| libgd3 | CVE-2021-40145 | HIGH | 2.2.4-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145</a><br><a href="https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af">https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af</a><br><a href="https://github.com/libgd/libgd/issues/700">https://github.com/libgd/libgd/issues/700</a><br><a href="https://github.com/libgd/libgd/pull/713">https://github.com/libgd/libgd/pull/713</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40145">https://nvd.nist.gov/vuln/detail/CVE-2021-40145</a><br><a href="https://ubuntu.com/security/notices/USN-5068-1">https://ubuntu.com/security/notices/USN-5068-1</a><br></details> |
| libgd3 | CVE-2021-38115 | MEDIUM | 2.2.4-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115</a><br><a href="https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032">https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032</a><br><a href="https://github.com/libgd/libgd/issues/697">https://github.com/libgd/libgd/issues/697</a><br><a href="https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032">https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38115">https://nvd.nist.gov/vuln/detail/CVE-2021-38115</a><br><a href="https://ubuntu.com/security/notices/USN-5068-1">https://ubuntu.com/security/notices/USN-5068-1</a><br></details> |
| libgd3 | CVE-2021-40812 | MEDIUM | 2.2.4-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812</a><br><a href="https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9">https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9</a><br><a href="https://github.com/libgd/libgd/issues/750#issuecomment-914872385">https://github.com/libgd/libgd/issues/750#issuecomment-914872385</a><br><a href="https://github.com/libgd/libgd/issues/757">https://github.com/libgd/libgd/issues/757</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40812">https://nvd.nist.gov/vuln/detail/CVE-2021-40812</a><br></details> |
| libgd3 | CVE-2018-14553 | LOW | 2.2.4-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-14553">https://access.redhat.com/security/cve/CVE-2018-14553</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1599032">https://bugzilla.redhat.com/show_bug.cgi?id=1599032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553</a><br><a href="https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f">https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f</a><br><a href="https://github.com/libgd/libgd/pull/580">https://github.com/libgd/libgd/pull/580</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14553.html">https://linux.oracle.com/cve/CVE-2018-14553.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4659.html">https://linux.oracle.com/errata/ELSA-2020-4659.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html">https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/</a><br><a href="https://ubuntu.com/security/notices/USN-4316-1">https://ubuntu.com/security/notices/USN-4316-1</a><br><a href="https://ubuntu.com/security/notices/USN-4316-2">https://ubuntu.com/security/notices/USN-4316-2</a><br><a href="https://usn.ubuntu.com/4316-1/">https://usn.ubuntu.com/4316-1/</a><br><a href="https://usn.ubuntu.com/4316-2/">https://usn.ubuntu.com/4316-2/</a><br></details> |
| libgdk-pixbuf2.0-0 | CVE-2017-2870 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100541">http://www.securityfocus.com/bid/100541</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-2870">https://access.redhat.com/security/cve/CVE-2017-2870</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html">https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377">https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377</a><br></details> |
| libgdk-pixbuf2.0-0 | CVE-2017-6311 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html">http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/21/4">http://www.openwall.com/lists/oss-security/2017/02/21/4</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/26/1">http://www.openwall.com/lists/oss-security/2017/02/26/1</a><br><a href="http://www.securityfocus.com/bid/96779">http://www.securityfocus.com/bid/96779</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6311">https://access.redhat.com/security/cve/CVE-2017-6311</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=778204">https://bugzilla.gnome.org/show_bug.cgi?id=778204</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/</a><br><a href="https://security.gentoo.org/glsa/201709-08">https://security.gentoo.org/glsa/201709-08</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br></details> |
| libgdk-pixbuf2.0-common | CVE-2017-2870 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100541">http://www.securityfocus.com/bid/100541</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-2870">https://access.redhat.com/security/cve/CVE-2017-2870</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html">https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377">https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377</a><br></details> |
| libgdk-pixbuf2.0-common | CVE-2017-6311 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html">http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/21/4">http://www.openwall.com/lists/oss-security/2017/02/21/4</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/26/1">http://www.openwall.com/lists/oss-security/2017/02/26/1</a><br><a href="http://www.securityfocus.com/bid/96779">http://www.securityfocus.com/bid/96779</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6311">https://access.redhat.com/security/cve/CVE-2017-6311</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=778204">https://bugzilla.gnome.org/show_bug.cgi?id=778204</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/</a><br><a href="https://security.gentoo.org/glsa/201709-08">https://security.gentoo.org/glsa/201709-08</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br></details> |
| libgdk-pixbuf2.0-dev | CVE-2017-2870 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100541">http://www.securityfocus.com/bid/100541</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-2870">https://access.redhat.com/security/cve/CVE-2017-2870</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html">https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377">https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377</a><br></details> |
| libgdk-pixbuf2.0-dev | CVE-2017-6311 | LOW | 2.36.5-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html">http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/21/4">http://www.openwall.com/lists/oss-security/2017/02/21/4</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/26/1">http://www.openwall.com/lists/oss-security/2017/02/26/1</a><br><a href="http://www.securityfocus.com/bid/96779">http://www.securityfocus.com/bid/96779</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6311">https://access.redhat.com/security/cve/CVE-2017-6311</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=778204">https://bugzilla.gnome.org/show_bug.cgi?id=778204</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/</a><br><a href="https://security.gentoo.org/glsa/201709-08">https://security.gentoo.org/glsa/201709-08</a><br><a href="https://ubuntu.com/security/notices/USN-3418-1">https://ubuntu.com/security/notices/USN-3418-1</a><br></details> |
| libglib2.0-0 | CVE-2021-27218 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27218">https://access.redhat.com/security/cve/CVE-2021-27218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27218.html">https://linux.oracle.com/cve/CVE-2021-27218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3058.html">https://linux.oracle.com/errata/ELSA-2021-3058.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">https://nvd.nist.gov/vuln/detail/CVE-2021-27218</a><br><a href="https://security.gentoo.org/glsa/202107-13">https://security.gentoo.org/glsa/202107-13</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-0 | CVE-2021-27219 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27219">https://access.redhat.com/security/cve/CVE-2021-27219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2319">https://gitlab.gnome.org/GNOME/glib/-/issues/2319</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27219.html">https://linux.oracle.com/cve/CVE-2021-27219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9318.html">https://linux.oracle.com/errata/ELSA-2021-9318.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">https://nvd.nist.gov/vuln/detail/CVE-2021-27219</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-0 | CVE-2021-28153 | MEDIUM | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28153">https://access.redhat.com/security/cve/CVE-2021-28153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2325">https://gitlab.gnome.org/GNOME/glib/-/issues/2325</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28153.html">https://linux.oracle.com/cve/CVE-2021-28153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4385.html">https://linux.oracle.com/errata/ELSA-2021-4385.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">https://nvd.nist.gov/vuln/detail/CVE-2021-28153</a><br><a href="https://security.netapp.com/advisory/ntap-20210416-0003/">https://security.netapp.com/advisory/ntap-20210416-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4764-1">https://ubuntu.com/security/notices/USN-4764-1</a><br></details> |
| libglib2.0-0 | CVE-2012-0039 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044</a><br><a href="http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html">http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html</a><br><a href="http://openwall.com/lists/oss-security/2012/01/10/12">http://openwall.com/lists/oss-security/2012/01/10/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2012-0039">https://access.redhat.com/security/cve/CVE-2012-0039</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=772720">https://bugzilla.redhat.com/show_bug.cgi?id=772720</a><br></details> |
| libglib2.0-0 | CVE-2020-35457 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d">https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2197">https://gitlab.gnome.org/GNOME/glib/-/issues/2197</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3">https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35457">https://nvd.nist.gov/vuln/detail/CVE-2020-35457</a><br></details> |
| libglib2.0-bin | CVE-2021-27218 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27218">https://access.redhat.com/security/cve/CVE-2021-27218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27218.html">https://linux.oracle.com/cve/CVE-2021-27218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3058.html">https://linux.oracle.com/errata/ELSA-2021-3058.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">https://nvd.nist.gov/vuln/detail/CVE-2021-27218</a><br><a href="https://security.gentoo.org/glsa/202107-13">https://security.gentoo.org/glsa/202107-13</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-bin | CVE-2021-27219 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27219">https://access.redhat.com/security/cve/CVE-2021-27219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2319">https://gitlab.gnome.org/GNOME/glib/-/issues/2319</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27219.html">https://linux.oracle.com/cve/CVE-2021-27219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9318.html">https://linux.oracle.com/errata/ELSA-2021-9318.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">https://nvd.nist.gov/vuln/detail/CVE-2021-27219</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-bin | CVE-2021-28153 | MEDIUM | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28153">https://access.redhat.com/security/cve/CVE-2021-28153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2325">https://gitlab.gnome.org/GNOME/glib/-/issues/2325</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28153.html">https://linux.oracle.com/cve/CVE-2021-28153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4385.html">https://linux.oracle.com/errata/ELSA-2021-4385.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">https://nvd.nist.gov/vuln/detail/CVE-2021-28153</a><br><a href="https://security.netapp.com/advisory/ntap-20210416-0003/">https://security.netapp.com/advisory/ntap-20210416-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4764-1">https://ubuntu.com/security/notices/USN-4764-1</a><br></details> |
| libglib2.0-bin | CVE-2012-0039 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044</a><br><a href="http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html">http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html</a><br><a href="http://openwall.com/lists/oss-security/2012/01/10/12">http://openwall.com/lists/oss-security/2012/01/10/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2012-0039">https://access.redhat.com/security/cve/CVE-2012-0039</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=772720">https://bugzilla.redhat.com/show_bug.cgi?id=772720</a><br></details> |
| libglib2.0-bin | CVE-2020-35457 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d">https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2197">https://gitlab.gnome.org/GNOME/glib/-/issues/2197</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3">https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35457">https://nvd.nist.gov/vuln/detail/CVE-2020-35457</a><br></details> |
| libglib2.0-data | CVE-2021-27218 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27218">https://access.redhat.com/security/cve/CVE-2021-27218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27218.html">https://linux.oracle.com/cve/CVE-2021-27218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3058.html">https://linux.oracle.com/errata/ELSA-2021-3058.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">https://nvd.nist.gov/vuln/detail/CVE-2021-27218</a><br><a href="https://security.gentoo.org/glsa/202107-13">https://security.gentoo.org/glsa/202107-13</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-data | CVE-2021-27219 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27219">https://access.redhat.com/security/cve/CVE-2021-27219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2319">https://gitlab.gnome.org/GNOME/glib/-/issues/2319</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27219.html">https://linux.oracle.com/cve/CVE-2021-27219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9318.html">https://linux.oracle.com/errata/ELSA-2021-9318.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">https://nvd.nist.gov/vuln/detail/CVE-2021-27219</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-data | CVE-2021-28153 | MEDIUM | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28153">https://access.redhat.com/security/cve/CVE-2021-28153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2325">https://gitlab.gnome.org/GNOME/glib/-/issues/2325</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28153.html">https://linux.oracle.com/cve/CVE-2021-28153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4385.html">https://linux.oracle.com/errata/ELSA-2021-4385.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">https://nvd.nist.gov/vuln/detail/CVE-2021-28153</a><br><a href="https://security.netapp.com/advisory/ntap-20210416-0003/">https://security.netapp.com/advisory/ntap-20210416-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4764-1">https://ubuntu.com/security/notices/USN-4764-1</a><br></details> |
| libglib2.0-data | CVE-2012-0039 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044</a><br><a href="http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html">http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html</a><br><a href="http://openwall.com/lists/oss-security/2012/01/10/12">http://openwall.com/lists/oss-security/2012/01/10/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2012-0039">https://access.redhat.com/security/cve/CVE-2012-0039</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=772720">https://bugzilla.redhat.com/show_bug.cgi?id=772720</a><br></details> |
| libglib2.0-data | CVE-2020-35457 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d">https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2197">https://gitlab.gnome.org/GNOME/glib/-/issues/2197</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3">https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35457">https://nvd.nist.gov/vuln/detail/CVE-2020-35457</a><br></details> |
| libglib2.0-dev | CVE-2021-27218 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27218">https://access.redhat.com/security/cve/CVE-2021-27218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944">https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27218.html">https://linux.oracle.com/cve/CVE-2021-27218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3058.html">https://linux.oracle.com/errata/ELSA-2021-3058.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">https://nvd.nist.gov/vuln/detail/CVE-2021-27218</a><br><a href="https://security.gentoo.org/glsa/202107-13">https://security.gentoo.org/glsa/202107-13</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-dev | CVE-2021-27219 | HIGH | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27219">https://access.redhat.com/security/cve/CVE-2021-27219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2319">https://gitlab.gnome.org/GNOME/glib/-/issues/2319</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27219.html">https://linux.oracle.com/cve/CVE-2021-27219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9318.html">https://linux.oracle.com/errata/ELSA-2021-9318.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">https://nvd.nist.gov/vuln/detail/CVE-2021-27219</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0004/">https://security.netapp.com/advisory/ntap-20210319-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4759-1">https://ubuntu.com/security/notices/USN-4759-1</a><br></details> |
| libglib2.0-dev | CVE-2021-28153 | MEDIUM | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28153">https://access.redhat.com/security/cve/CVE-2021-28153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2325">https://gitlab.gnome.org/GNOME/glib/-/issues/2325</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28153.html">https://linux.oracle.com/cve/CVE-2021-28153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4385.html">https://linux.oracle.com/errata/ELSA-2021-4385.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">https://nvd.nist.gov/vuln/detail/CVE-2021-28153</a><br><a href="https://security.netapp.com/advisory/ntap-20210416-0003/">https://security.netapp.com/advisory/ntap-20210416-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4764-1">https://ubuntu.com/security/notices/USN-4764-1</a><br></details> |
| libglib2.0-dev | CVE-2012-0039 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044</a><br><a href="http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html">http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html</a><br><a href="http://openwall.com/lists/oss-security/2012/01/10/12">http://openwall.com/lists/oss-security/2012/01/10/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2012-0039">https://access.redhat.com/security/cve/CVE-2012-0039</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=772720">https://bugzilla.redhat.com/show_bug.cgi?id=772720</a><br></details> |
| libglib2.0-dev | CVE-2020-35457 | LOW | 2.50.3-2+deb9u2 | | <details><summary>Expand...</summary><a href="https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d">https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/issues/2197">https://gitlab.gnome.org/GNOME/glib/-/issues/2197</a><br><a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3">https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35457">https://nvd.nist.gov/vuln/detail/CVE-2020-35457</a><br></details> |
| libgmp-dev | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-1 | 2:6.1.2+dfsg-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-1 | 2:6.1.2+dfsg-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
| libgmpxx4ldbl | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-1 | 2:6.1.2+dfsg-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
| libgnutls30 | CVE-2018-16868 | MEDIUM | 3.5.8-5+deb9u5 | | <details><summary>Expand...</summary><a href="http://cat.eyalro.net/">http://cat.eyalro.net/</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html</a><br><a href="http://www.securityfocus.com/bid/106080">http://www.securityfocus.com/bid/106080</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16868">https://access.redhat.com/security/cve/CVE-2018-16868</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868</a><br></details> |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.5.8-5+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4209">https://access.redhat.com/security/cve/CVE-2021-4209</a><br></details> |
| libgnutls30 | CVE-2011-3389 | LOW | 3.5.8-5+deb9u5 | | <details><summary>Expand...</summary><a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a><br><a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a><br><a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a><br><a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a><br><a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a><br><a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a><br><a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a><br><a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a><br><a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a><br><a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a><br><a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a><br><a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a><br><a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a><br><a href="http://osvdb.org/74829">http://osvdb.org/74829</a><br><a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a><br><a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a><br><a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a><br><a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a><br><a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a><br><a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a><br><a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a><br><a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a><br><a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a><br><a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a><br><a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a><br><a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a><br><a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a><br><a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a><br><a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a><br><a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a><br><a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a><br><a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a><br><a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a><br><a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a><br><a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a><br><a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a><br><a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a><br><a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a><br><a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a><br><a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a><br><a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a><br><a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a><br><a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a><br><a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a><br><a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a><br><a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a><br><a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a><br><a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a><br><a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a><br><a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a><br><a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-3389">https://access.redhat.com/security/cve/CVE-2011-3389</a><br><a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a><br><a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a><br><a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a><br><a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a><br><a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a><br><a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a><br><a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a><br></details> |
| libgnutls30 | DLA-2759-1 | UNKNOWN | 3.5.8-5+deb9u5 | 3.5.8-5+deb9u6 | <details><summary>Expand...</summary></details> |
| libgomp1 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgraphite2-3 | CVE-2018-7999 | HIGH | 1.3.10-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7999">https://access.redhat.com/security/cve/CVE-2018-7999</a><br><a href="https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6">https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6</a><br><a href="https://github.com/silnrsi/graphite/issues/22">https://github.com/silnrsi/graphite/issues/22</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5F3CK2IPXFCLQZEBEEXONWIABN2E7H2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5F3CK2IPXFCLQZEBEEXONWIABN2E7H2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWOKYZZDEMG6VSG53KAGUOHUIIQ7CND/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWOKYZZDEMG6VSG53KAGUOHUIIQ7CND/</a><br></details> |
| libgraphviz-dev | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libgraphviz-dev | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libgraphviz-dev | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libgraphviz-dev | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libgssapi-krb5-2 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libgssapi-krb5-2 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libgssrpc4 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libgssrpc4 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libgssrpc4 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libgssrpc4 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libgssrpc4 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libgssrpc4 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libgssrpc4 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libgssrpc4 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libgssrpc4 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libgvc6 | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libgvc6 | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libgvc6 | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libgvc6 | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libgvc6-plugins-gtk | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libgvc6-plugins-gtk | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libgvc6-plugins-gtk | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libgvc6-plugins-gtk | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libgvpr2 | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libgvpr2 | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libgvpr2 | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libgvpr2 | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libhogweed4 | CVE-2021-20305 | HIGH | 3.3-1 | 3.3-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20305">https://access.redhat.com/security/cve/CVE-2021-20305</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1942533">https://bugzilla.redhat.com/show_bug.cgi?id=1942533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20305.html">https://linux.oracle.com/cve/CVE-2021-20305.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1206.html">https://linux.oracle.com/errata/ELSA-2021-1206.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/</a><br><a href="https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html">https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">https://nvd.nist.gov/vuln/detail/CVE-2021-20305</a><br><a href="https://security.gentoo.org/glsa/202105-31">https://security.gentoo.org/glsa/202105-31</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0002/">https://security.netapp.com/advisory/ntap-20211022-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4906-1">https://ubuntu.com/security/notices/USN-4906-1</a><br><a href="https://www.debian.org/security/2021/dsa-4933">https://www.debian.org/security/2021/dsa-4933</a><br></details> |
| libhogweed4 | CVE-2021-3580 | HIGH | 3.3-1 | 3.3-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3580">https://access.redhat.com/security/cve/CVE-2021-3580</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1967983">https://bugzilla.redhat.com/show_bug.cgi?id=1967983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3580.html">https://linux.oracle.com/cve/CVE-2021-3580.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9221.html">https://linux.oracle.com/errata/ELSA-2022-9221.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">https://nvd.nist.gov/vuln/detail/CVE-2021-3580</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0006/">https://security.netapp.com/advisory/ntap-20211104-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4990-1">https://ubuntu.com/security/notices/USN-4990-1</a><br></details> |
| libhogweed4 | CVE-2018-16869 | MEDIUM | 3.3-1 | | <details><summary>Expand...</summary><a href="http://cat.eyalro.net/">http://cat.eyalro.net/</a><br><a href="http://www.securityfocus.com/bid/106092">http://www.securityfocus.com/bid/106092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16869">https://access.redhat.com/security/cve/CVE-2018-16869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869</a><br><a href="https://lists.debian.org/debian-lts/2019/03/msg00021.html">https://lists.debian.org/debian-lts/2019/03/msg00021.html</a><br><a href="https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html">https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html</a><br><a href="https://ubuntu.com/security/notices/USN-4990-1">https://ubuntu.com/security/notices/USN-4990-1</a><br></details> |
| libicu-dev | CVE-2020-21913 | MEDIUM | 57.1-6+deb9u4 | 57.1-6+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-21913">https://access.redhat.com/security/cve/CVE-2020-21913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913</a><br><a href="https://github.com/unicode-org/icu/pull/886">https://github.com/unicode-org/icu/pull/886</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html</a><br><a href="https://ubuntu.com/security/notices/USN-5133-1">https://ubuntu.com/security/notices/USN-5133-1</a><br><a href="https://unicode-org.atlassian.net/browse/ICU-20850">https://unicode-org.atlassian.net/browse/ICU-20850</a><br><a href="https://www.debian.org/security/2021/dsa-5014">https://www.debian.org/security/2021/dsa-5014</a><br></details> |
| libicu57 | CVE-2020-21913 | MEDIUM | 57.1-6+deb9u4 | 57.1-6+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-21913">https://access.redhat.com/security/cve/CVE-2020-21913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913</a><br><a href="https://github.com/unicode-org/icu/pull/886">https://github.com/unicode-org/icu/pull/886</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html</a><br><a href="https://ubuntu.com/security/notices/USN-5133-1">https://ubuntu.com/security/notices/USN-5133-1</a><br><a href="https://unicode-org.atlassian.net/browse/ICU-20850">https://unicode-org.atlassian.net/browse/ICU-20850</a><br><a href="https://www.debian.org/security/2021/dsa-5014">https://www.debian.org/security/2021/dsa-5014</a><br></details> |
| libitm1 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libjbig-dev | CVE-2017-9937 | LOW | 2.1-3.1 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2707">http://bugzilla.maptools.org/show_bug.cgi?id=2707</a><br><a href="http://www.securityfocus.com/bid/99304">http://www.securityfocus.com/bid/99304</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9937">https://access.redhat.com/security/cve/CVE-2017-9937</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2707">http://bugzilla.maptools.org/show_bug.cgi?id=2707</a><br><a href="http://www.securityfocus.com/bid/99304">http://www.securityfocus.com/bid/99304</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9937">https://access.redhat.com/security/cve/CVE-2017-9937</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libjpeg-dev | CVE-2017-15232 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15232">https://access.redhat.com/security/cve/CVE-2017-15232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232</a><br><a href="https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182">https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182</a><br><a href="https://github.com/mozilla/mozjpeg/issues/268">https://github.com/mozilla/mozjpeg/issues/268</a><br><a href="https://ubuntu.com/security/notices/USN-3706-1">https://ubuntu.com/security/notices/USN-3706-1</a><br><a href="https://usn.ubuntu.com/3706-1/">https://usn.ubuntu.com/3706-1/</a><br></details> |
| libjpeg-dev | CVE-2018-11813 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html</a><br><a href="http://www.ijg.org/files/jpegsrc.v9d.tar.gz">http://www.ijg.org/files/jpegsrc.v9d.tar.gz</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2052">https://access.redhat.com/errata/RHSA-2019:2052</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-11813">https://access.redhat.com/security/cve/CVE-2018-11813</a><br><a href="https://bugs.gentoo.org/727908">https://bugs.gentoo.org/727908</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813</a><br><a href="https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf">https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf</a><br><a href="https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c">https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11813.html">https://linux.oracle.com/cve/CVE-2018-11813.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2052.html">https://linux.oracle.com/errata/ELSA-2019-2052.html</a><br></details> |
| libjpeg-dev | CVE-2019-2201 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-2201">https://access.redhat.com/security/cve/CVE-2019-2201</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201</a><br><a href="https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E">https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/</a><br><a href="https://security.gentoo.org/glsa/202003-23">https://security.gentoo.org/glsa/202003-23</a><br><a href="https://source.android.com/security/bulletin/2019-11-01">https://source.android.com/security/bulletin/2019-11-01</a><br><a href="https://ubuntu.com/security/notices/USN-4190-1">https://ubuntu.com/security/notices/USN-4190-1</a><br><a href="https://usn.ubuntu.com/4190-1/">https://usn.ubuntu.com/4190-1/</a><br></details> |
| libjpeg-dev | CVE-2020-17541 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-17541">https://access.redhat.com/security/cve/CVE-2020-17541</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541</a><br><a href="https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392">https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392</a><br><a href="https://linux.oracle.com/cve/CVE-2020-17541.html">https://linux.oracle.com/cve/CVE-2020-17541.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4288.html">https://linux.oracle.com/errata/ELSA-2021-4288.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">https://nvd.nist.gov/vuln/detail/CVE-2020-17541</a><br></details> |
| libjpeg62-turbo | CVE-2017-15232 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15232">https://access.redhat.com/security/cve/CVE-2017-15232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232</a><br><a href="https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182">https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182</a><br><a href="https://github.com/mozilla/mozjpeg/issues/268">https://github.com/mozilla/mozjpeg/issues/268</a><br><a href="https://ubuntu.com/security/notices/USN-3706-1">https://ubuntu.com/security/notices/USN-3706-1</a><br><a href="https://usn.ubuntu.com/3706-1/">https://usn.ubuntu.com/3706-1/</a><br></details> |
| libjpeg62-turbo | CVE-2018-11813 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html</a><br><a href="http://www.ijg.org/files/jpegsrc.v9d.tar.gz">http://www.ijg.org/files/jpegsrc.v9d.tar.gz</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2052">https://access.redhat.com/errata/RHSA-2019:2052</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-11813">https://access.redhat.com/security/cve/CVE-2018-11813</a><br><a href="https://bugs.gentoo.org/727908">https://bugs.gentoo.org/727908</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813</a><br><a href="https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf">https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf</a><br><a href="https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c">https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11813.html">https://linux.oracle.com/cve/CVE-2018-11813.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2052.html">https://linux.oracle.com/errata/ELSA-2019-2052.html</a><br></details> |
| libjpeg62-turbo | CVE-2019-2201 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-2201">https://access.redhat.com/security/cve/CVE-2019-2201</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201</a><br><a href="https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E">https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/</a><br><a href="https://security.gentoo.org/glsa/202003-23">https://security.gentoo.org/glsa/202003-23</a><br><a href="https://source.android.com/security/bulletin/2019-11-01">https://source.android.com/security/bulletin/2019-11-01</a><br><a href="https://ubuntu.com/security/notices/USN-4190-1">https://ubuntu.com/security/notices/USN-4190-1</a><br><a href="https://usn.ubuntu.com/4190-1/">https://usn.ubuntu.com/4190-1/</a><br></details> |
| libjpeg62-turbo | CVE-2020-17541 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-17541">https://access.redhat.com/security/cve/CVE-2020-17541</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541</a><br><a href="https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392">https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392</a><br><a href="https://linux.oracle.com/cve/CVE-2020-17541.html">https://linux.oracle.com/cve/CVE-2020-17541.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4288.html">https://linux.oracle.com/errata/ELSA-2021-4288.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">https://nvd.nist.gov/vuln/detail/CVE-2020-17541</a><br></details> |
| libjpeg62-turbo-dev | CVE-2017-15232 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15232">https://access.redhat.com/security/cve/CVE-2017-15232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232</a><br><a href="https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182">https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182</a><br><a href="https://github.com/mozilla/mozjpeg/issues/268">https://github.com/mozilla/mozjpeg/issues/268</a><br><a href="https://ubuntu.com/security/notices/USN-3706-1">https://ubuntu.com/security/notices/USN-3706-1</a><br><a href="https://usn.ubuntu.com/3706-1/">https://usn.ubuntu.com/3706-1/</a><br></details> |
| libjpeg62-turbo-dev | CVE-2018-11813 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html</a><br><a href="http://www.ijg.org/files/jpegsrc.v9d.tar.gz">http://www.ijg.org/files/jpegsrc.v9d.tar.gz</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2052">https://access.redhat.com/errata/RHSA-2019:2052</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-11813">https://access.redhat.com/security/cve/CVE-2018-11813</a><br><a href="https://bugs.gentoo.org/727908">https://bugs.gentoo.org/727908</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813</a><br><a href="https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf">https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf</a><br><a href="https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c">https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11813.html">https://linux.oracle.com/cve/CVE-2018-11813.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2052.html">https://linux.oracle.com/errata/ELSA-2019-2052.html</a><br></details> |
| libjpeg62-turbo-dev | CVE-2019-2201 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-2201">https://access.redhat.com/security/cve/CVE-2019-2201</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201</a><br><a href="https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E">https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/</a><br><a href="https://security.gentoo.org/glsa/202003-23">https://security.gentoo.org/glsa/202003-23</a><br><a href="https://source.android.com/security/bulletin/2019-11-01">https://source.android.com/security/bulletin/2019-11-01</a><br><a href="https://ubuntu.com/security/notices/USN-4190-1">https://ubuntu.com/security/notices/USN-4190-1</a><br><a href="https://usn.ubuntu.com/4190-1/">https://usn.ubuntu.com/4190-1/</a><br></details> |
| libjpeg62-turbo-dev | CVE-2020-17541 | LOW | 1:1.5.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-17541">https://access.redhat.com/security/cve/CVE-2020-17541</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541</a><br><a href="https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392">https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392</a><br><a href="https://linux.oracle.com/cve/CVE-2020-17541.html">https://linux.oracle.com/cve/CVE-2020-17541.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4288.html">https://linux.oracle.com/errata/ELSA-2021-4288.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">https://nvd.nist.gov/vuln/detail/CVE-2020-17541</a><br></details> |
| libjs-jquery | CVE-2020-11022 | MEDIUM | 3.1.1-2+deb9u1 | 3.1.1-2+deb9u2 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html</a><br><a href="http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html">http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11022">https://access.redhat.com/security/cve/CVE-2020-11022</a><br><a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a><br><a href="https://github.com/advisories/GHSA-gxr4-xjj5-5px2">https://github.com/advisories/GHSA-gxr4-xjj5-5px2</a><br><a href="https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77">https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77</a><br><a href="https://github.com/jquery/jquery/releases/tag/3.5.0">https://github.com/jquery/jquery/releases/tag/3.5.0</a><br><a href="https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2">https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2</a><br><a href="https://jquery.com/upgrade-guide/3.5/">https://jquery.com/upgrade-guide/3.5/</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11022.html">https://linux.oracle.com/cve/CVE-2020-11022.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9177.html">https://linux.oracle.com/errata/ELSA-2022-9177.html</a><br><a href="https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E">https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E">https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">https://nvd.nist.gov/vuln/detail/CVE-2020-11022</a><br><a href="https://security.gentoo.org/glsa/202007-03">https://security.gentoo.org/glsa/202007-03</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0006/">https://security.netapp.com/advisory/ntap-20200511-0006/</a><br><a href="https://www.debian.org/security/2020/dsa-4693">https://www.debian.org/security/2020/dsa-4693</a><br><a href="https://www.drupal.org/sa-core-2020-002">https://www.drupal.org/sa-core-2020-002</a><br><a href="https://www.npmjs.com/advisories/1518">https://www.npmjs.com/advisories/1518</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2020-10">https://www.tenable.com/security/tns-2020-10</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-02">https://www.tenable.com/security/tns-2021-02</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libjs-jquery | CVE-2020-11023 | MEDIUM | 3.1.1-2+deb9u1 | 3.1.1-2+deb9u2 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html</a><br><a href="http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html">http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11023">https://access.redhat.com/security/cve/CVE-2020-11023</a><br><a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released</a><br><a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a><br><a href="https://github.com/advisories/GHSA-jpcq-cgw6-v4j6">https://github.com/advisories/GHSA-jpcq-cgw6-v4j6</a><br><a href="https://github.com/jquery/jquery/releases/tag/3.5.0">https://github.com/jquery/jquery/releases/tag/3.5.0</a><br><a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6</a><br><a href="https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a><br><a href="https://jquery.com/upgrade-guide/3.5/">https://jquery.com/upgrade-guide/3.5/</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11023.html">https://linux.oracle.com/cve/CVE-2020-11023.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9177.html">https://linux.oracle.com/errata/ELSA-2022-9177.html</a><br><a href="https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E">https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E">https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E">https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E">https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E">https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E">https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E">https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E">https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E">https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E">https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E">https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E">https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E">https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E">https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">https://nvd.nist.gov/vuln/detail/CVE-2020-11023</a><br><a href="https://security.gentoo.org/glsa/202007-03">https://security.gentoo.org/glsa/202007-03</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0006/">https://security.netapp.com/advisory/ntap-20200511-0006/</a><br><a href="https://www.debian.org/security/2020/dsa-4693">https://www.debian.org/security/2020/dsa-4693</a><br><a href="https://www.drupal.org/sa-core-2020-002">https://www.drupal.org/sa-core-2020-002</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-02">https://www.tenable.com/security/tns-2021-02</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libjs-jquery | CVE-2007-2379 | LOW | 3.1.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="http://osvdb.org/43320">http://osvdb.org/43320</a><br><a href="http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf">http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0007/">https://security.netapp.com/advisory/ntap-20190416-0007/</a><br></details> |
| libjs-jquery | CVE-2018-18405 | LOW | 3.1.1-2+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18405">https://access.redhat.com/security/cve/CVE-2018-18405</a><br><a href="https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4">https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4</a><br><a href="https://gitter.im/jquery/jquery?at=5ea844a05cd4fe50a3d7ddc9">https://gitter.im/jquery/jquery?at=5ea844a05cd4fe50a3d7ddc9</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/</a><br><a href="https://twitter.com/DanielRufde/status/1255185961866145792">https://twitter.com/DanielRufde/status/1255185961866145792</a><br></details> |
| libk5crypto3 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libk5crypto3 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libk5crypto3 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libk5crypto3 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libk5crypto3 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libk5crypto3 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkadm5clnt-mit11 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libkadm5clnt-mit11 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libkadm5clnt-mit11 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkadm5clnt-mit11 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkadm5clnt-mit11 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkadm5clnt-mit11 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libkadm5clnt-mit11 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libkadm5clnt-mit11 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkadm5clnt-mit11 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkadm5srv-mit11 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libkadm5srv-mit11 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libkadm5srv-mit11 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkadm5srv-mit11 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkadm5srv-mit11 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkadm5srv-mit11 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libkadm5srv-mit11 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libkadm5srv-mit11 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkadm5srv-mit11 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkdb5-8 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libkdb5-8 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libkdb5-8 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkdb5-8 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkdb5-8 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkdb5-8 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libkdb5-8 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libkdb5-8 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkdb5-8 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkrb5-3 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libkrb5-3 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libkrb5-3 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5-3 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libkrb5-3 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5-3 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkrb5-dev | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libkrb5-dev | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libkrb5-dev | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkrb5-dev | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5-dev | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5-dev | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libkrb5-dev | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libkrb5-dev | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5-dev | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkrb5support0 | CVE-2018-20217 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20217">https://access.redhat.com/security/cve/CVE-2018-20217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217</a><br><a href="https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086">https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/</a><br><a href="https://security.netapp.com/advisory/ntap-20190416-0006/">https://security.netapp.com/advisory/ntap-20190416-0006/</a><br></details> |
| libkrb5support0 | CVE-2018-5710 | MEDIUM | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5710">https://access.redhat.com/security/cve/CVE-2018-5710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)</a><br></details> |
| libkrb5support0 | CVE-2018-5729 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5729">https://access.redhat.com/security/cve/CVE-2018-5729</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083">https://bugzilla.redhat.com/show_bug.cgi?id=1551083</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5729.html">https://linux.oracle.com/cve/CVE-2018-5729.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5support0 | CVE-2017-11462 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598">http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11462">https://access.redhat.com/security/cve/CVE-2017-11462</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1488873">https://bugzilla.redhat.com/show_bug.cgi?id=1488873</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462</a><br><a href="https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf">https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/</a><br></details> |
| libkrb5support0 | CVE-2017-15088 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101594">http://www.securityfocus.com/bid/101594</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15088">https://access.redhat.com/security/cve/CVE-2017-15088</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1504045">https://bugzilla.redhat.com/show_bug.cgi?id=1504045</a><br><a href="https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4">https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4</a><br><a href="https://github.com/krb5/krb5/pull/707">https://github.com/krb5/krb5/pull/707</a><br></details> |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.15-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5support0 | CVE-2018-5730 | LOW | 1.15-1+deb9u2 | 1.15-1+deb9u3 | <details><summary>Expand...</summary><a href="http://www.securitytracker.com/id/1042071">http://www.securitytracker.com/id/1042071</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3071">https://access.redhat.com/errata/RHSA-2018:3071</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5730">https://access.redhat.com/security/cve/CVE-2018-5730</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082">https://bugzilla.redhat.com/show_bug.cgi?id=1551082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730</a><br><a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5730.html">https://linux.oracle.com/cve/CVE-2018-5730.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3071.html">https://linux.oracle.com/errata/ELSA-2018-3071.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/</a><br></details> |
| libldap-2.4-2 | CVE-2021-27212 | HIGH | 2.4.44+dfsg-5+deb9u7 | 2.4.44+dfsg-5+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27212">https://access.redhat.com/security/cve/CVE-2021-27212</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9454">https://bugs.openldap.org/show_bug.cgi?id=9454</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0">https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30">https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">https://nvd.nist.gov/vuln/detail/CVE-2021-27212</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0005/">https://security.netapp.com/advisory/ntap-20210319-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-4744-1">https://ubuntu.com/security/notices/USN-4744-1</a><br><a href="https://www.debian.org/security/2021/dsa-4860">https://www.debian.org/security/2021/dsa-4860</a><br></details> |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br></details> |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-common | CVE-2021-27212 | HIGH | 2.4.44+dfsg-5+deb9u7 | 2.4.44+dfsg-5+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27212">https://access.redhat.com/security/cve/CVE-2021-27212</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9454">https://bugs.openldap.org/show_bug.cgi?id=9454</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0">https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30">https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">https://nvd.nist.gov/vuln/detail/CVE-2021-27212</a><br><a href="https://security.netapp.com/advisory/ntap-20210319-0005/">https://security.netapp.com/advisory/ntap-20210319-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-4744-1">https://ubuntu.com/security/notices/USN-4744-1</a><br><a href="https://www.debian.org/security/2021/dsa-4860">https://www.debian.org/security/2021/dsa-4860</a><br></details> |
| libldap-common | CVE-2015-3276 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-common | CVE-2017-14159 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br></details> |
| libldap-common | CVE-2017-17740 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-common | CVE-2020-15719 | LOW | 2.4.44+dfsg-5+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| liblsan0 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| liblz4-1 | CVE-2021-3520 | CRITICAL | 0.0~r131-2 | 0.0~r131-2+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3520">https://access.redhat.com/security/cve/CVE-2021-3520</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954559">https://bugzilla.redhat.com/show_bug.cgi?id=1954559</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520</a><br><a href="https://github.com/lz4/lz4/pull/972">https://github.com/lz4/lz4/pull/972</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3520.html">https://linux.oracle.com/cve/CVE-2021-3520.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2575.html">https://linux.oracle.com/errata/ELSA-2021-2575.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0005/">https://security.netapp.com/advisory/ntap-20211104-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-4968-1">https://ubuntu.com/security/notices/USN-4968-1</a><br><a href="https://ubuntu.com/security/notices/USN-4968-2">https://ubuntu.com/security/notices/USN-4968-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| liblz4-1 | CVE-2019-17543 | LOW | 0.0~r131-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17543">https://access.redhat.com/security/cve/CVE-2019-17543</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a><br><a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a><br><a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a><br><a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a><br><a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a><br><a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libmagic-mgc | CVE-2019-8907 | HIGH | 1:5.30-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8907">https://access.redhat.com/security/cve/CVE-2019-8907</a><br><a href="https://bugs.astron.com/view.php?id=65">https://bugs.astron.com/view.php?id=65</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html</a><br><a href="https://ubuntu.com/security/notices/USN-3911-1">https://ubuntu.com/security/notices/USN-3911-1</a><br><a href="https://usn.ubuntu.com/3911-1/">https://usn.ubuntu.com/3911-1/</a><br></details> |
| libmagic-mgc | CVE-2019-8905 | MEDIUM | 1:5.30-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html</a><br><a href="http://www.securityfocus.com/bid/107137">http://www.securityfocus.com/bid/107137</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8905">https://access.redhat.com/security/cve/CVE-2019-8905</a><br><a href="https://bugs.astron.com/view.php?id=63">https://bugs.astron.com/view.php?id=63</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html</a><br><a href="https://ubuntu.com/security/notices/USN-3911-1">https://ubuntu.com/security/notices/USN-3911-1</a><br><a href="https://usn.ubuntu.com/3911-1/">https://usn.ubuntu.com/3911-1/</a><br></details> |
| libmagic1 | CVE-2019-8907 | HIGH | 1:5.30-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8907">https://access.redhat.com/security/cve/CVE-2019-8907</a><br><a href="https://bugs.astron.com/view.php?id=65">https://bugs.astron.com/view.php?id=65</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html</a><br><a href="https://ubuntu.com/security/notices/USN-3911-1">https://ubuntu.com/security/notices/USN-3911-1</a><br><a href="https://usn.ubuntu.com/3911-1/">https://usn.ubuntu.com/3911-1/</a><br></details> |
| libmagic1 | CVE-2019-8905 | MEDIUM | 1:5.30-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html</a><br><a href="http://www.securityfocus.com/bid/107137">http://www.securityfocus.com/bid/107137</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8905">https://access.redhat.com/security/cve/CVE-2019-8905</a><br><a href="https://bugs.astron.com/view.php?id=63">https://bugs.astron.com/view.php?id=63</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html">https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html</a><br><a href="https://ubuntu.com/security/notices/USN-3911-1">https://ubuntu.com/security/notices/USN-3911-1</a><br><a href="https://usn.ubuntu.com/3911-1/">https://usn.ubuntu.com/3911-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickcore-6-arch-config | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickcore-6-arch-config | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickcore-6-arch-config | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickcore-6-arch-config | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickcore-6-arch-config | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-arch-config | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickcore-6-headers | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickcore-6-headers | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickcore-6-headers | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickcore-6-headers | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickcore-6-headers | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickcore-6-headers | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickcore-6-headers | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickcore-6-headers | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickcore-6-headers | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickcore-6-headers | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickcore-6-headers | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickcore-6-headers | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickcore-6-headers | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6-headers | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickcore-6-headers | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6-headers | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6-headers | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3 | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-3-extra | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-6.q16-dev | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickcore-dev | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickcore-dev | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-dev | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickcore-dev | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickcore-dev | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickcore-dev | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickcore-dev | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickcore-dev | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickcore-dev | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickcore-dev | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickcore-dev | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickcore-dev | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickcore-dev | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickcore-dev | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickcore-dev | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickcore-dev | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickcore-dev | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-dev | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickcore-dev | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickcore-dev | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickcore-dev | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickcore-dev | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-dev | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickcore-dev | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickcore-dev | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickcore-dev | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickcore-dev | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickcore-dev | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickcore-dev | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickcore-dev | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickcore-dev | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickcore-dev | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickcore-dev | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickcore-dev | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickcore-dev | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickcore-dev | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickcore-dev | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickcore-dev | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickcore-dev | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickcore-dev | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickcore-dev | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-dev | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-dev | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-dev | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickcore-dev | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickcore-dev | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickcore-dev | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickcore-dev | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickcore-dev | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickcore-dev | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickcore-dev | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickcore-dev | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickcore-dev | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickcore-dev | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-dev | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickcore-dev | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickcore-dev | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickcore-dev | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickcore-dev | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickwand-6-headers | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickwand-6-headers | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickwand-6-headers | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickwand-6-headers | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickwand-6-headers | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickwand-6-headers | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickwand-6-headers | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickwand-6-headers | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickwand-6-headers | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickwand-6-headers | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickwand-6-headers | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickwand-6-headers | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickwand-6-headers | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-6-headers | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickwand-6-headers | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6-headers | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6-headers | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-3 | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-6.q16-dev | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmagickwand-dev | CVE-2020-27752 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27752">https://access.redhat.com/security/cve/CVE-2020-27752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894226">https://bugzilla.redhat.com/show_bug.cgi?id=1894226</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752</a><br></details> |
| libmagickwand-dev | CVE-2020-27766 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27766">https://access.redhat.com/security/cve/CVE-2020-27766</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894686">https://bugzilla.redhat.com/show_bug.cgi?id=1894686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20309 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20309">https://access.redhat.com/security/cve/CVE-2021-20309</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946722">https://bugzilla.redhat.com/show_bug.cgi?id=1946722</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20312 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20312">https://access.redhat.com/security/cve/CVE-2021-20312</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946742">https://bugzilla.redhat.com/show_bug.cgi?id=1946742</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20313 | HIGH | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20313">https://access.redhat.com/security/cve/CVE-2021-20313</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947019">https://bugzilla.redhat.com/show_bug.cgi?id=1947019</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-dev | CVE-2020-25664 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25664">https://access.redhat.com/security/cve/CVE-2020-25664</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891605">https://bugzilla.redhat.com/show_bug.cgi?id=1891605</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2020-25676 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25676">https://access.redhat.com/security/cve/CVE-2020-25676</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891934">https://bugzilla.redhat.com/show_bug.cgi?id=1891934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27762 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27762">https://access.redhat.com/security/cve/CVE-2020-27762</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894680">https://bugzilla.redhat.com/show_bug.cgi?id=1894680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27770 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27770">https://access.redhat.com/security/cve/CVE-2020-27770</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894691">https://bugzilla.redhat.com/show_bug.cgi?id=1894691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20176 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20176">https://access.redhat.com/security/cve/CVE-2021-20176</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1916610">https://bugzilla.redhat.com/show_bug.cgi?id=1916610</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20241 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20241">https://access.redhat.com/security/cve/CVE-2021-20241</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928952">https://bugzilla.redhat.com/show_bug.cgi?id=1928952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3177">https://github.com/ImageMagick/ImageMagick/pull/3177</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20243 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20243">https://access.redhat.com/security/cve/CVE-2021-20243</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928958">https://bugzilla.redhat.com/show_bug.cgi?id=1928958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3193">https://github.com/ImageMagick/ImageMagick/pull/3193</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20244 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20244">https://access.redhat.com/security/cve/CVE-2021-20244</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928959">https://bugzilla.redhat.com/show_bug.cgi?id=1928959</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244</a><br><a href="https://github.com/ImageMagick/ImageMagick/pull/3194">https://github.com/ImageMagick/ImageMagick/pull/3194</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20245 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20245">https://access.redhat.com/security/cve/CVE-2021-20245</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928943">https://bugzilla.redhat.com/show_bug.cgi?id=1928943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/3176">https://github.com/ImageMagick/ImageMagick/issues/3176</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br></details> |
| libmagickwand-dev | CVE-2021-20246 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20246">https://access.redhat.com/security/cve/CVE-2021-20246</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1928941">https://bugzilla.redhat.com/show_bug.cgi?id=1928941</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-5158-1">https://ubuntu.com/security/notices/USN-5158-1</a><br></details> |
| libmagickwand-dev | CVE-2021-3596 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3596">https://access.redhat.com/security/cve/CVE-2021-3596</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970569">https://bugzilla.redhat.com/show_bug.cgi?id=1970569</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/2624">https://github.com/ImageMagick/ImageMagick/issues/2624</a><br></details> |
| libmagickwand-dev | CVE-2021-39212 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39212">https://access.redhat.com/security/cve/CVE-2021-39212</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68">https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e">https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e</a><br><a href="https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr">https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr</a><br></details> |
| libmagickwand-dev | CVE-2021-4219 | MEDIUM | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4219">https://access.redhat.com/security/cve/CVE-2021-4219</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2054611">https://bugzilla.redhat.com/show_bug.cgi?id=2054611</a><br></details> |
| libmagickwand-dev | CVE-2005-0406 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html">http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html</a><br><a href="http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt">http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt</a><br></details> |
| libmagickwand-dev | CVE-2008-3134 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html</a><br><a href="http://secunia.com/advisories/30879">http://secunia.com/advisories/30879</a><br><a href="http://secunia.com/advisories/32151">http://secunia.com/advisories/32151</a><br><a href="http://sourceforge.net/forum/forum.php?forum_id=841176">http://sourceforge.net/forum/forum.php?forum_id=841176</a><br><a href="http://sourceforge.net/project/shownotes.php?release_id=610253">http://sourceforge.net/project/shownotes.php?release_id=610253</a><br><a href="http://www.securityfocus.com/bid/30055">http://www.securityfocus.com/bid/30055</a><br><a href="http://www.securitytracker.com/id?1020413">http://www.securitytracker.com/id?1020413</a><br><a href="http://www.vupen.com/english/advisories/2008/1984/references">http://www.vupen.com/english/advisories/2008/1984/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-3134">https://access.redhat.com/security/cve/CVE-2008-3134</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43511">https://exchange.xforce.ibmcloud.com/vulnerabilities/43511</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43513">https://exchange.xforce.ibmcloud.com/vulnerabilities/43513</a><br></details> |
| libmagickwand-dev | CVE-2016-8678 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/16/2">http://www.openwall.com/lists/oss-security/2016/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/18">http://www.openwall.com/lists/oss-security/2016/12/08/18</a><br><a href="http://www.securityfocus.com/bid/93599">http://www.securityfocus.com/bid/93599</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8678">https://access.redhat.com/security/cve/CVE-2016-8678</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1385694">https://bugzilla.redhat.com/show_bug.cgi?id=1385694</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/272">https://github.com/ImageMagick/ImageMagick/issues/272</a><br></details> |
| libmagickwand-dev | CVE-2017-11531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99998">http://www.securityfocus.com/bid/99998</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11531">https://access.redhat.com/security/cve/CVE-2017-11531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/566">https://github.com/ImageMagick/ImageMagick/issues/566</a><br></details> |
| libmagickwand-dev | CVE-2017-11532 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11532">https://access.redhat.com/security/cve/CVE-2017-11532</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/563">https://github.com/ImageMagick/ImageMagick/issues/563</a><br></details> |
| libmagickwand-dev | CVE-2017-11534 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11534">https://access.redhat.com/security/cve/CVE-2017-11534</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/564">https://github.com/ImageMagick/ImageMagick/issues/564</a><br></details> |
| libmagickwand-dev | CVE-2017-11536 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100000">http://www.securityfocus.com/bid/100000</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11536">https://access.redhat.com/security/cve/CVE-2017-11536</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/567">https://github.com/ImageMagick/ImageMagick/issues/567</a><br></details> |
| libmagickwand-dev | CVE-2017-11539 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99936">http://www.securityfocus.com/bid/99936</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11539">https://access.redhat.com/security/cve/CVE-2017-11539</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/582">https://github.com/ImageMagick/ImageMagick/issues/582</a><br></details> |
| libmagickwand-dev | CVE-2017-11644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100014">http://www.securityfocus.com/bid/100014</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11644">https://access.redhat.com/security/cve/CVE-2017-11644</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/587">https://github.com/ImageMagick/ImageMagick/issues/587</a><br></details> |
| libmagickwand-dev | CVE-2017-11724 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104597">http://www.securityfocus.com/bid/104597</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11724">https://access.redhat.com/security/cve/CVE-2017-11724</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/624">https://github.com/ImageMagick/ImageMagick/issues/624</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-dev | CVE-2017-11751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11751">https://access.redhat.com/security/cve/CVE-2017-11751</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/631">https://github.com/ImageMagick/ImageMagick/issues/631</a><br></details> |
| libmagickwand-dev | CVE-2017-11752 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11752">https://access.redhat.com/security/cve/CVE-2017-11752</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/628">https://github.com/ImageMagick/ImageMagick/issues/628</a><br></details> |
| libmagickwand-dev | CVE-2017-11754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11754">https://access.redhat.com/security/cve/CVE-2017-11754</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/633">https://github.com/ImageMagick/ImageMagick/issues/633</a><br></details> |
| libmagickwand-dev | CVE-2017-11755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-11755">https://access.redhat.com/security/cve/CVE-2017-11755</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/634">https://github.com/ImageMagick/ImageMagick/issues/634</a><br></details> |
| libmagickwand-dev | CVE-2017-12418 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12418">https://access.redhat.com/security/cve/CVE-2017-12418</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/643">https://github.com/ImageMagick/ImageMagick/issues/643</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-12427 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12427">https://access.redhat.com/security/cve/CVE-2017-12427</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b">https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/636">https://github.com/ImageMagick/ImageMagick/issues/636</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-dev | CVE-2017-12433 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12433">https://access.redhat.com/security/cve/CVE-2017-12433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/548">https://github.com/ImageMagick/ImageMagick/issues/548</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-12564 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100161">http://www.securityfocus.com/bid/100161</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12564">https://access.redhat.com/security/cve/CVE-2017-12564</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/601">https://github.com/ImageMagick/ImageMagick/issues/601</a><br></details> |
| libmagickwand-dev | CVE-2017-12565 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100156">http://www.securityfocus.com/bid/100156</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12565">https://access.redhat.com/security/cve/CVE-2017-12565</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/602">https://github.com/ImageMagick/ImageMagick/issues/602</a><br></details> |
| libmagickwand-dev | CVE-2017-12566 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12566">https://access.redhat.com/security/cve/CVE-2017-12566</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/603">https://github.com/ImageMagick/ImageMagick/issues/603</a><br></details> |
| libmagickwand-dev | CVE-2017-12641 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12641">https://access.redhat.com/security/cve/CVE-2017-12641</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8">https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/550">https://github.com/ImageMagick/ImageMagick/issues/550</a><br></details> |
| libmagickwand-dev | CVE-2017-12642 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100159">http://www.securityfocus.com/bid/100159</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12642">https://access.redhat.com/security/cve/CVE-2017-12642</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/552">https://github.com/ImageMagick/ImageMagick/issues/552</a><br></details> |
| libmagickwand-dev | CVE-2017-12644 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100162">http://www.securityfocus.com/bid/100162</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12644">https://access.redhat.com/security/cve/CVE-2017-12644</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42">https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/551">https://github.com/ImageMagick/ImageMagick/issues/551</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-12654 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100230">http://www.securityfocus.com/bid/100230</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12654">https://access.redhat.com/security/cve/CVE-2017-12654</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/620">https://github.com/ImageMagick/ImageMagick/issues/620</a><br></details> |
| libmagickwand-dev | CVE-2017-12662 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100232">http://www.securityfocus.com/bid/100232</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12662">https://access.redhat.com/security/cve/CVE-2017-12662</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829">https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/576">https://github.com/ImageMagick/ImageMagick/issues/576</a><br></details> |
| libmagickwand-dev | CVE-2017-12663 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12663">https://access.redhat.com/security/cve/CVE-2017-12663</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444">https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/573">https://github.com/ImageMagick/ImageMagick/issues/573</a><br></details> |
| libmagickwand-dev | CVE-2017-12664 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12664">https://access.redhat.com/security/cve/CVE-2017-12664</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89">https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/574">https://github.com/ImageMagick/ImageMagick/issues/574</a><br></details> |
| libmagickwand-dev | CVE-2017-12665 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12665">https://access.redhat.com/security/cve/CVE-2017-12665</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e">https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/577">https://github.com/ImageMagick/ImageMagick/issues/577</a><br></details> |
| libmagickwand-dev | CVE-2017-12666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100226">http://www.securityfocus.com/bid/100226</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12666">https://access.redhat.com/security/cve/CVE-2017-12666</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c">https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/572">https://github.com/ImageMagick/ImageMagick/issues/572</a><br></details> |
| libmagickwand-dev | CVE-2017-12667 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12667">https://access.redhat.com/security/cve/CVE-2017-12667</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db">https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/553">https://github.com/ImageMagick/ImageMagick/issues/553</a><br></details> |
| libmagickwand-dev | CVE-2017-12668 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12668">https://access.redhat.com/security/cve/CVE-2017-12668</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74">https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/575">https://github.com/ImageMagick/ImageMagick/issues/575</a><br></details> |
| libmagickwand-dev | CVE-2017-12669 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12669">https://access.redhat.com/security/cve/CVE-2017-12669</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7">https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/571">https://github.com/ImageMagick/ImageMagick/issues/571</a><br></details> |
| libmagickwand-dev | CVE-2017-12670 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100252">http://www.securityfocus.com/bid/100252</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12670">https://access.redhat.com/security/cve/CVE-2017-12670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/610">https://github.com/ImageMagick/ImageMagick/issues/610</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-12672 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100224">http://www.securityfocus.com/bid/100224</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12672">https://access.redhat.com/security/cve/CVE-2017-12672</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/617">https://github.com/ImageMagick/ImageMagick/issues/617</a><br></details> |
| libmagickwand-dev | CVE-2017-12673 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100228">http://www.securityfocus.com/bid/100228</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12673">https://access.redhat.com/security/cve/CVE-2017-12673</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/619">https://github.com/ImageMagick/ImageMagick/issues/619</a><br></details> |
| libmagickwand-dev | CVE-2017-12675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12675">https://access.redhat.com/security/cve/CVE-2017-12675</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/616">https://github.com/ImageMagick/ImageMagick/issues/616</a><br></details> |
| libmagickwand-dev | CVE-2017-12676 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100225">http://www.securityfocus.com/bid/100225</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12676">https://access.redhat.com/security/cve/CVE-2017-12676</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/618">https://github.com/ImageMagick/ImageMagick/issues/618</a><br></details> |
| libmagickwand-dev | CVE-2017-13058 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100468">http://www.securityfocus.com/bid/100468</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13058">https://access.redhat.com/security/cve/CVE-2017-13058</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/666">https://github.com/ImageMagick/ImageMagick/issues/666</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-13059 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100457">http://www.securityfocus.com/bid/100457</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13059">https://access.redhat.com/security/cve/CVE-2017-13059</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/667">https://github.com/ImageMagick/ImageMagick/issues/667</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-13060 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100469">http://www.securityfocus.com/bid/100469</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13060">https://access.redhat.com/security/cve/CVE-2017-13060</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/644">https://github.com/ImageMagick/ImageMagick/issues/644</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-13062 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13062">https://access.redhat.com/security/cve/CVE-2017-13062</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/669">https://github.com/ImageMagick/ImageMagick/issues/669</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-13131 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100478">http://www.securityfocus.com/bid/100478</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13131">https://access.redhat.com/security/cve/CVE-2017-13131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/676">https://github.com/ImageMagick/ImageMagick/issues/676</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-13146 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-13146">https://access.redhat.com/security/cve/CVE-2017-13146</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20">https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-dev | CVE-2017-14137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14137">https://access.redhat.com/security/cve/CVE-2017-14137</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/641">https://github.com/ImageMagick/ImageMagick/issues/641</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-dev | CVE-2017-14138 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14138">https://access.redhat.com/security/cve/CVE-2017-14138</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/639">https://github.com/ImageMagick/ImageMagick/issues/639</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-dev | CVE-2017-14139 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14139">https://access.redhat.com/security/cve/CVE-2017-14139</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/578">https://github.com/ImageMagick/ImageMagick/issues/578</a><br><a href="https://security.gentoo.org/glsa/201711-07">https://security.gentoo.org/glsa/201711-07</a><br></details> |
| libmagickwand-dev | CVE-2017-14324 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100863">http://www.securityfocus.com/bid/100863</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14324">https://access.redhat.com/security/cve/CVE-2017-14324</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/739">https://github.com/ImageMagick/ImageMagick/issues/739</a><br></details> |
| libmagickwand-dev | CVE-2017-14325 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100874">http://www.securityfocus.com/bid/100874</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14325">https://access.redhat.com/security/cve/CVE-2017-14325</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/741">https://github.com/ImageMagick/ImageMagick/issues/741</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-14326 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14326">https://access.redhat.com/security/cve/CVE-2017-14326</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/740">https://github.com/ImageMagick/ImageMagick/issues/740</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-14342 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14342">https://access.redhat.com/security/cve/CVE-2017-14342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/650">https://github.com/ImageMagick/ImageMagick/issues/650</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-14343 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14343">https://access.redhat.com/security/cve/CVE-2017-14343</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/649">https://github.com/ImageMagick/ImageMagick/issues/649</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-14531 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100888">http://www.securityfocus.com/bid/100888</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14531">https://access.redhat.com/security/cve/CVE-2017-14531</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/718">https://github.com/ImageMagick/ImageMagick/issues/718</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-14533 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100885">http://www.securityfocus.com/bid/100885</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14533">https://access.redhat.com/security/cve/CVE-2017-14533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/648">https://github.com/ImageMagick/ImageMagick/issues/648</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-14684 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-14684">https://access.redhat.com/security/cve/CVE-2017-14684</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/770">https://github.com/ImageMagick/ImageMagick/issues/770</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-15016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15016">https://access.redhat.com/security/cve/CVE-2017-15016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/725">https://github.com/ImageMagick/ImageMagick/issues/725</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-15032 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15032">https://access.redhat.com/security/cve/CVE-2017-15032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0">https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-15033 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-15033">https://access.redhat.com/security/cve/CVE-2017-15033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683">https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-15217 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101231">http://www.securityfocus.com/bid/101231</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15217">https://access.redhat.com/security/cve/CVE-2017-15217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/759">https://github.com/ImageMagick/ImageMagick/issues/759</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-15218 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/101233">http://www.securityfocus.com/bid/101233</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-15218">https://access.redhat.com/security/cve/CVE-2017-15218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/760">https://github.com/ImageMagick/ImageMagick/issues/760</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17680 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102203">http://www.securityfocus.com/bid/102203</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17680">https://access.redhat.com/security/cve/CVE-2017-17680</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/873">https://github.com/ImageMagick/ImageMagick/issues/873</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17880 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102317">http://www.securityfocus.com/bid/102317</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17880">https://access.redhat.com/security/cve/CVE-2017-17880</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/907">https://github.com/ImageMagick/ImageMagick/issues/907</a><br></details> |
| libmagickwand-dev | CVE-2017-17881 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17881">https://access.redhat.com/security/cve/CVE-2017-17881</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/878">https://github.com/ImageMagick/ImageMagick/issues/878</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17882 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17882">https://access.redhat.com/security/cve/CVE-2017-17882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/880">https://github.com/ImageMagick/ImageMagick/issues/880</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17883 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17883">https://access.redhat.com/security/cve/CVE-2017-17883</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/877">https://github.com/ImageMagick/ImageMagick/issues/877</a><br></details> |
| libmagickwand-dev | CVE-2017-17884 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17884">https://access.redhat.com/security/cve/CVE-2017-17884</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/902">https://github.com/ImageMagick/ImageMagick/issues/902</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17885 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17885">https://access.redhat.com/security/cve/CVE-2017-17885</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/879">https://github.com/ImageMagick/ImageMagick/issues/879</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17886 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17886">https://access.redhat.com/security/cve/CVE-2017-17886</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/874">https://github.com/ImageMagick/ImageMagick/issues/874</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17887 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17887">https://access.redhat.com/security/cve/CVE-2017-17887</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/903">https://github.com/ImageMagick/ImageMagick/issues/903</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-17934 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102314">http://www.securityfocus.com/bid/102314</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17934">https://access.redhat.com/security/cve/CVE-2017-17934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/920">https://github.com/ImageMagick/ImageMagick/issues/920</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18008 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102346">http://www.securityfocus.com/bid/102346</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18008">https://access.redhat.com/security/cve/CVE-2017-18008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/921">https://github.com/ImageMagick/ImageMagick/issues/921</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18022 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102437">http://www.securityfocus.com/bid/102437</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18022">https://access.redhat.com/security/cve/CVE-2017-18022</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/904">https://github.com/ImageMagick/ImageMagick/issues/904</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18027 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102527">http://www.securityfocus.com/bid/102527</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18027">https://access.redhat.com/security/cve/CVE-2017-18027</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/734">https://github.com/ImageMagick/ImageMagick/issues/734</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18028 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18028">https://access.redhat.com/security/cve/CVE-2017-18028</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/736">https://github.com/ImageMagick/ImageMagick/issues/736</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18029 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102519">http://www.securityfocus.com/bid/102519</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18029">https://access.redhat.com/security/cve/CVE-2017-18029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/691">https://github.com/ImageMagick/ImageMagick/issues/691</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18251 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18251">https://access.redhat.com/security/cve/CVE-2017-18251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18251.html">https://linux.oracle.com/cve/CVE-2017-18251.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-18254 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-18254">https://access.redhat.com/security/cve/CVE-2017-18254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18254.html">https://linux.oracle.com/cve/CVE-2017-18254.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2017-6502 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/96763">http://www.securityfocus.com/bid/96763</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-6502">https://access.redhat.com/security/cve/CVE-2017-6502</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df">https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df</a><br></details> |
| libmagickwand-dev | CVE-2017-7275 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97166">http://www.securityfocus.com/bid/97166</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7275">https://access.redhat.com/security/cve/CVE-2017-7275</a><br><a href="https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/">https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/271">https://github.com/ImageMagick/ImageMagick/issues/271</a><br></details> |
| libmagickwand-dev | CVE-2018-10804 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10804">https://access.redhat.com/security/cve/CVE-2018-10804</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1053">https://github.com/ImageMagick/ImageMagick/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10804.html">https://linux.oracle.com/cve/CVE-2018-10804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-10805 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10805">https://access.redhat.com/security/cve/CVE-2018-10805</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1054">https://github.com/ImageMagick/ImageMagick/issues/1054</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10805.html">https://linux.oracle.com/cve/CVE-2018-10805.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-11655 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11655">https://access.redhat.com/security/cve/CVE-2018-11655</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/930">https://github.com/ImageMagick/ImageMagick/issues/930</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-11656 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-11656">https://access.redhat.com/security/cve/CVE-2018-11656</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/931">https://github.com/ImageMagick/ImageMagick/issues/931</a><br><a href="https://linux.oracle.com/cve/CVE-2018-11656.html">https://linux.oracle.com/cve/CVE-2018-11656.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-13153 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104687">http://www.securityfocus.com/bid/104687</a><br><a href="http://www.securitytracker.com/id/1041219">http://www.securitytracker.com/id/1041219</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13153">https://access.redhat.com/security/cve/CVE-2018-13153</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1195">https://github.com/ImageMagick/ImageMagick/issues/1195</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13153.html">https://linux.oracle.com/cve/CVE-2018-13153.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3711-1">https://ubuntu.com/security/notices/USN-3711-1</a><br><a href="https://usn.ubuntu.com/3711-1/">https://usn.ubuntu.com/3711-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-14434 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14434">https://access.redhat.com/security/cve/CVE-2018-14434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1192">https://github.com/ImageMagick/ImageMagick/issues/1192</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14434.html">https://linux.oracle.com/cve/CVE-2018-14434.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-14435 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14435">https://access.redhat.com/security/cve/CVE-2018-14435</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1193">https://github.com/ImageMagick/ImageMagick/issues/1193</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14435.html">https://linux.oracle.com/cve/CVE-2018-14435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-14436 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14436">https://access.redhat.com/security/cve/CVE-2018-14436</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1191">https://github.com/ImageMagick/ImageMagick/issues/1191</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14436.html">https://linux.oracle.com/cve/CVE-2018-14436.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-14437 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14437">https://access.redhat.com/security/cve/CVE-2018-14437</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1190">https://github.com/ImageMagick/ImageMagick/issues/1190</a><br><a href="https://linux.oracle.com/cve/CVE-2018-14437.html">https://linux.oracle.com/cve/CVE-2018-14437.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-15607 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105137">http://www.securityfocus.com/bid/105137</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15607">https://access.redhat.com/security/cve/CVE-2018-15607</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1255">https://github.com/ImageMagick/ImageMagick/issues/1255</a><br><a href="https://linux.oracle.com/cve/CVE-2018-15607.html">https://linux.oracle.com/cve/CVE-2018-15607.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-16640 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-16640">https://access.redhat.com/security/cve/CVE-2018-16640</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b">https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1201">https://github.com/ImageMagick/ImageMagick/issues/1201</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-16750 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108492">http://www.securityfocus.com/bid/108492</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16750">https://access.redhat.com/security/cve/CVE-2018-16750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705">https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1118">https://github.com/ImageMagick/ImageMagick/issues/1118</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc">https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16750.html">https://linux.oracle.com/cve/CVE-2018-16750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-3785-1">https://ubuntu.com/security/notices/USN-3785-1</a><br><a href="https://usn.ubuntu.com/3785-1/">https://usn.ubuntu.com/3785-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-17965 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17965">https://access.redhat.com/security/cve/CVE-2018-17965</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1052">https://github.com/ImageMagick/ImageMagick/issues/1052</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-17966 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17966">https://access.redhat.com/security/cve/CVE-2018-17966</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1050">https://github.com/ImageMagick/ImageMagick/issues/1050</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-17967 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17967">https://access.redhat.com/security/cve/CVE-2018-17967</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1051">https://github.com/ImageMagick/ImageMagick/issues/1051</a><br></details> |
| libmagickwand-dev | CVE-2018-18016 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18016">https://access.redhat.com/security/cve/CVE-2018-18016</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1049">https://github.com/ImageMagick/ImageMagick/issues/1049</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-18544 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog">http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18544">https://access.redhat.com/security/cve/CVE-2018-18544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1360">https://github.com/ImageMagick/ImageMagick/issues/1360</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18544.html">https://linux.oracle.com/cve/CVE-2018-18544.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-5246 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102469">http://www.securityfocus.com/bid/102469</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5246">https://access.redhat.com/security/cve/CVE-2018-5246</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/929">https://github.com/ImageMagick/ImageMagick/issues/929</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-5247 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5247">https://access.redhat.com/security/cve/CVE-2018-5247</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/928">https://github.com/ImageMagick/ImageMagick/issues/928</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-5357 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102497">http://www.securityfocus.com/bid/102497</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-5357">https://access.redhat.com/security/cve/CVE-2018-5357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/941">https://github.com/ImageMagick/ImageMagick/issues/941</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-5358 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5358">https://access.redhat.com/security/cve/CVE-2018-5358</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/939">https://github.com/ImageMagick/ImageMagick/issues/939</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-6405 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6405">https://access.redhat.com/security/cve/CVE-2018-6405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/964">https://github.com/ImageMagick/ImageMagick/issues/964</a><br><a href="https://ubuntu.com/security/notices/USN-3681-1">https://ubuntu.com/security/notices/USN-3681-1</a><br><a href="https://usn.ubuntu.com/3681-1/">https://usn.ubuntu.com/3681-1/</a><br></details> |
| libmagickwand-dev | CVE-2018-7470 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7470">https://access.redhat.com/security/cve/CVE-2018-7470</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/998">https://github.com/ImageMagick/ImageMagick/issues/998</a><br></details> |
| libmagickwand-dev | CVE-2018-9135 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-9135">https://access.redhat.com/security/cve/CVE-2018-9135</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1009">https://github.com/ImageMagick/ImageMagick/issues/1009</a><br></details> |
| libmagickwand-dev | CVE-2019-10649 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107645">http://www.securityfocus.com/bid/107645</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10649">https://access.redhat.com/security/cve/CVE-2019-10649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1533">https://github.com/ImageMagick/ImageMagick/issues/1533</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-12975 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12975">https://access.redhat.com/security/cve/CVE-2019-12975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1517">https://github.com/ImageMagick/ImageMagick/issues/1517</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12975.html">https://linux.oracle.com/cve/CVE-2019-12975.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-12976 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="http://www.securityfocus.com/bid/108913">http://www.securityfocus.com/bid/108913</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12976">https://access.redhat.com/security/cve/CVE-2019-12976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12976.html">https://linux.oracle.com/cve/CVE-2019-12976.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-13137 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13137">https://access.redhat.com/security/cve/CVE-2019-13137</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34">https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1601">https://github.com/ImageMagick/ImageMagick/issues/1601</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b">https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-13301 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13301">https://access.redhat.com/security/cve/CVE-2019-13301</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025">https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1585">https://github.com/ImageMagick/ImageMagick/issues/1585</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1589">https://github.com/ImageMagick/ImageMagick/issues/1589</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13301.html">https://linux.oracle.com/cve/CVE-2019-13301.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-13309 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13309">https://access.redhat.com/security/cve/CVE-2019-13309</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13309.html">https://linux.oracle.com/cve/CVE-2019-13309.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-13310 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13310">https://access.redhat.com/security/cve/CVE-2019-13310</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d">https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1616">https://github.com/ImageMagick/ImageMagick/issues/1616</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51">https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13310.html">https://linux.oracle.com/cve/CVE-2019-13310.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-dev | CVE-2019-13311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13311">https://access.redhat.com/security/cve/CVE-2019-13311</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a">https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1623">https://github.com/ImageMagick/ImageMagick/issues/1623</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91">https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13311.html">https://linux.oracle.com/cve/CVE-2019-13311.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-16708 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16708">https://access.redhat.com/security/cve/CVE-2019-16708</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16708.html">https://linux.oracle.com/cve/CVE-2019-16708.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-16709 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16709">https://access.redhat.com/security/cve/CVE-2019-16709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1531">https://github.com/ImageMagick/ImageMagick/issues/1531</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16709.html">https://linux.oracle.com/cve/CVE-2019-16709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br></details> |
| libmagickwand-dev | CVE-2019-16710 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16710">https://access.redhat.com/security/cve/CVE-2019-16710</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1528">https://github.com/ImageMagick/ImageMagick/issues/1528</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16710.html">https://linux.oracle.com/cve/CVE-2019-16710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-16711 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16711">https://access.redhat.com/security/cve/CVE-2019-16711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1542">https://github.com/ImageMagick/ImageMagick/issues/1542</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16711.html">https://linux.oracle.com/cve/CVE-2019-16711.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-16712 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16712">https://access.redhat.com/security/cve/CVE-2019-16712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1557">https://github.com/ImageMagick/ImageMagick/issues/1557</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16712.html">https://linux.oracle.com/cve/CVE-2019-16712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br></details> |
| libmagickwand-dev | CVE-2019-16713 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16713">https://access.redhat.com/security/cve/CVE-2019-16713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1558">https://github.com/ImageMagick/ImageMagick/issues/1558</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16713.html">https://linux.oracle.com/cve/CVE-2019-16713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4192-1">https://ubuntu.com/security/notices/USN-4192-1</a><br><a href="https://usn.ubuntu.com/4192-1/">https://usn.ubuntu.com/4192-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-7175 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7175">https://access.redhat.com/security/cve/CVE-2019-7175</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae">https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1450">https://github.com/ImageMagick/ImageMagick/issues/1450</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7175.html">https://linux.oracle.com/cve/CVE-2019-7175.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-7395 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106850">http://www.securityfocus.com/bid/106850</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7395">https://access.redhat.com/security/cve/CVE-2019-7395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06">https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1451">https://github.com/ImageMagick/ImageMagick/issues/1451</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-7396 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://www.securityfocus.com/bid/106849">http://www.securityfocus.com/bid/106849</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7396">https://access.redhat.com/security/cve/CVE-2019-7396</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce">https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1452">https://github.com/ImageMagick/ImageMagick/issues/1452</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-7397 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1">http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106847">http://www.securityfocus.com/bid/106847</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7397">https://access.redhat.com/security/cve/CVE-2019-7397</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397</a><br><a href="https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82">https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1454">https://github.com/ImageMagick/ImageMagick/issues/1454</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7397.html">https://linux.oracle.com/cve/CVE-2019-7397.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2019-7398 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html</a><br><a href="http://www.securityfocus.com/bid/106848">http://www.securityfocus.com/bid/106848</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7398">https://access.redhat.com/security/cve/CVE-2019-7398</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1453">https://github.com/ImageMagick/ImageMagick/issues/1453</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7398.html">https://linux.oracle.com/cve/CVE-2019-7398.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1180.html">https://linux.oracle.com/errata/ELSA-2020-1180.html</a><br><a href="https://ubuntu.com/security/notices/USN-4034-1">https://ubuntu.com/security/notices/USN-4034-1</a><br><a href="https://usn.ubuntu.com/4034-1/">https://usn.ubuntu.com/4034-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4712">https://www.debian.org/security/2020/dsa-4712</a><br></details> |
| libmagickwand-dev | CVE-2020-25666 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25666">https://access.redhat.com/security/cve/CVE-2020-25666</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891612">https://bugzilla.redhat.com/show_bug.cgi?id=1891612</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-25675 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25675">https://access.redhat.com/security/cve/CVE-2020-25675</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891933">https://bugzilla.redhat.com/show_bug.cgi?id=1891933</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27751 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27751">https://access.redhat.com/security/cve/CVE-2020-27751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1891994">https://bugzilla.redhat.com/show_bug.cgi?id=1891994</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27753 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27753">https://access.redhat.com/security/cve/CVE-2020-27753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894229">https://bugzilla.redhat.com/show_bug.cgi?id=1894229</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br><a href="https://ubuntu.com/security/notices/USN-5335-1">https://ubuntu.com/security/notices/USN-5335-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27754 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27754">https://access.redhat.com/security/cve/CVE-2020-27754</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894231">https://bugzilla.redhat.com/show_bug.cgi?id=1894231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27755 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27755">https://access.redhat.com/security/cve/CVE-2020-27755</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894232">https://bugzilla.redhat.com/show_bug.cgi?id=1894232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27757 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27757">https://access.redhat.com/security/cve/CVE-2020-27757</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894234">https://bugzilla.redhat.com/show_bug.cgi?id=1894234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27758 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27758">https://access.redhat.com/security/cve/CVE-2020-27758</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894236">https://bugzilla.redhat.com/show_bug.cgi?id=1894236</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27759 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27759">https://access.redhat.com/security/cve/CVE-2020-27759</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894238">https://bugzilla.redhat.com/show_bug.cgi?id=1894238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27761 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27761">https://access.redhat.com/security/cve/CVE-2020-27761</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894679">https://bugzilla.redhat.com/show_bug.cgi?id=1894679</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27764 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27764">https://access.redhat.com/security/cve/CVE-2020-27764</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894683">https://bugzilla.redhat.com/show_bug.cgi?id=1894683</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764</a><br><a href="https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5">https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27767 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27767">https://access.redhat.com/security/cve/CVE-2020-27767</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894687">https://bugzilla.redhat.com/show_bug.cgi?id=1894687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27768 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27768">https://access.redhat.com/security/cve/CVE-2020-27768</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894689">https://bugzilla.redhat.com/show_bug.cgi?id=1894689</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27769 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27769">https://access.redhat.com/security/cve/CVE-2020-27769</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894690">https://bugzilla.redhat.com/show_bug.cgi?id=1894690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769</a><br><a href="https://github.com/ImageMagick/ImageMagick/issues/1740">https://github.com/ImageMagick/ImageMagick/issues/1740</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27771 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27771">https://access.redhat.com/security/cve/CVE-2020-27771</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898290">https://bugzilla.redhat.com/show_bug.cgi?id=1898290</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27772 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27772">https://access.redhat.com/security/cve/CVE-2020-27772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898291">https://bugzilla.redhat.com/show_bug.cgi?id=1898291</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27774 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27774">https://access.redhat.com/security/cve/CVE-2020-27774</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898296">https://bugzilla.redhat.com/show_bug.cgi?id=1898296</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27775 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27775">https://access.redhat.com/security/cve/CVE-2020-27775</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898300">https://bugzilla.redhat.com/show_bug.cgi?id=1898300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2020-27776 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | 8:6.9.7.4+dfsg-11+deb9u12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27776">https://access.redhat.com/security/cve/CVE-2020-27776</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1898304">https://bugzilla.redhat.com/show_bug.cgi?id=1898304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776</a><br><a href="https://ubuntu.com/security/notices/USN-4988-1">https://ubuntu.com/security/notices/USN-4988-1</a><br></details> |
| libmagickwand-dev | CVE-2021-20311 | LOW | 8:6.9.7.4+dfsg-11+deb9u11 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20311">https://access.redhat.com/security/cve/CVE-2021-20311</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946739">https://bugzilla.redhat.com/show_bug.cgi?id=1946739</a><br></details> |
| libmariadbclient-dev | CVE-2021-27928 | HIGH | 10.1.48-0+deb9u1 | 10.1.48-0+deb9u2 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| libmariadbclient-dev-compat | CVE-2021-27928 | HIGH | 10.1.48-0+deb9u1 | 10.1.48-0+deb9u2 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| libmariadbclient18 | CVE-2021-27928 | HIGH | 10.1.48-0+deb9u1 | 10.1.48-0+deb9u2 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| libmount1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| libmount1 | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libmount1 | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libmpx2 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libncurses5 | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| libncurses5 | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncurses5 | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncurses5 | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncurses5-dev | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| libncurses5-dev | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncurses5-dev | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncurses5-dev | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncursesw5 | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| libncursesw5 | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncursesw5 | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncursesw5 | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncursesw5-dev | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| libncursesw5-dev | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncursesw5-dev | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libncursesw5-dev | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libnettle6 | CVE-2021-20305 | HIGH | 3.3-1 | 3.3-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20305">https://access.redhat.com/security/cve/CVE-2021-20305</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1942533">https://bugzilla.redhat.com/show_bug.cgi?id=1942533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20305.html">https://linux.oracle.com/cve/CVE-2021-20305.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1206.html">https://linux.oracle.com/errata/ELSA-2021-1206.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/</a><br><a href="https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html">https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">https://nvd.nist.gov/vuln/detail/CVE-2021-20305</a><br><a href="https://security.gentoo.org/glsa/202105-31">https://security.gentoo.org/glsa/202105-31</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0002/">https://security.netapp.com/advisory/ntap-20211022-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4906-1">https://ubuntu.com/security/notices/USN-4906-1</a><br><a href="https://www.debian.org/security/2021/dsa-4933">https://www.debian.org/security/2021/dsa-4933</a><br></details> |
| libnettle6 | CVE-2021-3580 | HIGH | 3.3-1 | 3.3-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3580">https://access.redhat.com/security/cve/CVE-2021-3580</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1967983">https://bugzilla.redhat.com/show_bug.cgi?id=1967983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3580.html">https://linux.oracle.com/cve/CVE-2021-3580.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9221.html">https://linux.oracle.com/errata/ELSA-2022-9221.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">https://nvd.nist.gov/vuln/detail/CVE-2021-3580</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0006/">https://security.netapp.com/advisory/ntap-20211104-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4990-1">https://ubuntu.com/security/notices/USN-4990-1</a><br></details> |
| libnettle6 | CVE-2018-16869 | MEDIUM | 3.3-1 | | <details><summary>Expand...</summary><a href="http://cat.eyalro.net/">http://cat.eyalro.net/</a><br><a href="http://www.securityfocus.com/bid/106092">http://www.securityfocus.com/bid/106092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16869">https://access.redhat.com/security/cve/CVE-2018-16869</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869</a><br><a href="https://lists.debian.org/debian-lts/2019/03/msg00021.html">https://lists.debian.org/debian-lts/2019/03/msg00021.html</a><br><a href="https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html">https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html</a><br><a href="https://ubuntu.com/security/notices/USN-4990-1">https://ubuntu.com/security/notices/USN-4990-1</a><br></details> |
| libnghttp2-14 | CVE-2018-1000168 | HIGH | 1.18.1-1+deb9u1 | 1.18.1-1+deb9u2 | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103952">http://www.securityfocus.com/bid/103952</a><br><a href="https://access.redhat.com/errata/RHSA-2019:0366">https://access.redhat.com/errata/RHSA-2019:0366</a><br><a href="https://access.redhat.com/errata/RHSA-2019:0367">https://access.redhat.com/errata/RHSA-2019:0367</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000168">https://access.redhat.com/security/cve/CVE-2018-1000168</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000168">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000168</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/">https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/</a><br><a href="https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/">https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">https://nvd.nist.gov/vuln/detail/CVE-2018-1000168</a><br></details> |
| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.18.1-1+deb9u1 | 1.18.1-1+deb9u2 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11080">https://access.redhat.com/security/cve/CVE-2020-11080</a><br><a href="https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090">https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090</a><br><a href="https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394">https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394</a><br><a href="https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr">https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11080.html">https://linux.oracle.com/cve/CVE-2020-11080.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5765.html">https://linux.oracle.com/errata/ELSA-2020-5765.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">https://nvd.nist.gov/vuln/detail/CVE-2020-11080</a><br><a href="https://www.debian.org/security/2020/dsa-4696">https://www.debian.org/security/2020/dsa-4696</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libopenexr-dev | CVE-2021-20298 | HIGH | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20298">https://access.redhat.com/security/cve/CVE-2021-20298</a><br></details> |
| libopenexr-dev | CVE-2021-20299 | HIGH | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20299">https://access.redhat.com/security/cve/CVE-2021-20299</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939154">https://bugzilla.redhat.com/show_bug.cgi?id=1939154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f">https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/840">https://github.com/AcademySoftwareFoundation/openexr/pull/840</a><br></details> |
| libopenexr-dev | CVE-2020-16587 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16587">https://access.redhat.com/security/cve/CVE-2020-16587</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a">https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/issues/491">https://github.com/AcademySoftwareFoundation/openexr/issues/491</a><br><a href="https://ubuntu.com/security/notices/USN-4676-1">https://ubuntu.com/security/notices/USN-4676-1</a><br></details> |
| libopenexr-dev | CVE-2021-20296 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20296">https://access.redhat.com/security/cve/CVE-2021-20296</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939141">https://bugzilla.redhat.com/show_bug.cgi?id=1939141</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br><a href="https://www.openexr.com/">https://www.openexr.com/</a><br></details> |
| libopenexr-dev | CVE-2021-20300 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20300">https://access.redhat.com/security/cve/CVE-2021-20300</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939153">https://bugzilla.redhat.com/show_bug.cgi?id=1939153</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/836">https://github.com/AcademySoftwareFoundation/openexr/pull/836</a><br></details> |
| libopenexr-dev | CVE-2021-20302 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20302">https://access.redhat.com/security/cve/CVE-2021-20302</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939161">https://bugzilla.redhat.com/show_bug.cgi?id=1939161</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/842">https://github.com/AcademySoftwareFoundation/openexr/pull/842</a><br></details> |
| libopenexr-dev | CVE-2021-20303 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20303">https://access.redhat.com/security/cve/CVE-2021-20303</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939151">https://bugzilla.redhat.com/show_bug.cgi?id=1939151</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/831">https://github.com/AcademySoftwareFoundation/openexr/pull/831</a><br></details> |
| libopenexr-dev | CVE-2021-23215 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23215">https://access.redhat.com/security/cve/CVE-2021-23215</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947586">https://bugzilla.redhat.com/show_bug.cgi?id=1947586</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/901">https://github.com/AcademySoftwareFoundation/openexr/pull/901</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr-dev | CVE-2021-26260 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-26260">https://access.redhat.com/security/cve/CVE-2021-26260</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947582">https://bugzilla.redhat.com/show_bug.cgi?id=1947582</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/894">https://github.com/AcademySoftwareFoundation/openexr/pull/894</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr-dev | CVE-2021-3474 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3474">https://access.redhat.com/security/cve/CVE-2021-3474</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939142">https://bugzilla.redhat.com/show_bug.cgi?id=1939142</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://security.gentoo.org/glsa/202107-27">https://security.gentoo.org/glsa/202107-27</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com/">https://www.openexr.com/</a><br></details> |
| libopenexr-dev | CVE-2021-3475 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3475">https://access.redhat.com/security/cve/CVE-2021-3475</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939144">https://bugzilla.redhat.com/show_bug.cgi?id=1939144</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr-dev | CVE-2021-3476 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3476">https://access.redhat.com/security/cve/CVE-2021-3476</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939145">https://bugzilla.redhat.com/show_bug.cgi?id=1939145</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr-dev | CVE-2021-3477 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3477">https://access.redhat.com/security/cve/CVE-2021-3477</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939159">https://bugzilla.redhat.com/show_bug.cgi?id=1939159</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://security.gentoo.org/glsa/202107-27">https://security.gentoo.org/glsa/202107-27</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr-dev | CVE-2021-3478 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3478">https://access.redhat.com/security/cve/CVE-2021-3478</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939160">https://bugzilla.redhat.com/show_bug.cgi?id=1939160</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com/">https://www.openexr.com/</a><br></details> |
| libopenexr-dev | CVE-2021-3479 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3479">https://access.redhat.com/security/cve/CVE-2021-3479</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939149">https://bugzilla.redhat.com/show_bug.cgi?id=1939149</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr-dev | CVE-2021-3598 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3598">https://access.redhat.com/security/cve/CVE-2021-3598</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970987">https://bugzilla.redhat.com/show_bug.cgi?id=1970987</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1037">https://github.com/AcademySoftwareFoundation/openexr/pull/1037</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr-dev | CVE-2021-3605 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3605">https://access.redhat.com/security/cve/CVE-2021-3605</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970991">https://bugzilla.redhat.com/show_bug.cgi?id=1970991</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1036">https://github.com/AcademySoftwareFoundation/openexr/pull/1036</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr-dev | CVE-2021-3941 | MEDIUM | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3941">https://access.redhat.com/security/cve/CVE-2021-3941</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019789">https://bugzilla.redhat.com/show_bug.cgi?id=2019789</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1153">https://github.com/AcademySoftwareFoundation/openexr/pull/1153</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/</a><br><a href="https://ubuntu.com/security/notices/USN-5150-1">https://ubuntu.com/security/notices/USN-5150-1</a><br></details> |
| libopenexr-dev | CVE-2021-45942 | MEDIUM | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45942">https://access.redhat.com/security/cve/CVE-2021-45942</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022">https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e">https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0">https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1209">https://github.com/AcademySoftwareFoundation/openexr/pull/1209</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4">https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml</a><br></details> |
| libopenexr-dev | CVE-2017-14988 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14988">https://access.redhat.com/security/cve/CVE-2017-14988</a><br><a href="https://github.com/openexr/openexr/issues/248">https://github.com/openexr/openexr/issues/248</a><br></details> |
| libopenexr-dev | CVE-2018-18443 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18443">https://access.redhat.com/security/cve/CVE-2018-18443</a><br><a href="https://github.com/openexr/openexr/issues/350">https://github.com/openexr/openexr/issues/350</a><br><a href="https://github.com/openexr/openexr/releases/tag/v2.4.0">https://github.com/openexr/openexr/releases/tag/v2.4.0</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/</a><br></details> |
| libopenexr-dev | CVE-2021-20304 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20304">https://access.redhat.com/security/cve/CVE-2021-20304</a><br></details> |
| libopenexr-dev | CVE-2021-26945 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-26945">https://access.redhat.com/security/cve/CVE-2021-26945</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947591">https://bugzilla.redhat.com/show_bug.cgi?id=1947591</a><br></details> |
| libopenexr22 | CVE-2021-20298 | HIGH | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20298">https://access.redhat.com/security/cve/CVE-2021-20298</a><br></details> |
| libopenexr22 | CVE-2021-20299 | HIGH | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20299">https://access.redhat.com/security/cve/CVE-2021-20299</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939154">https://bugzilla.redhat.com/show_bug.cgi?id=1939154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f">https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/840">https://github.com/AcademySoftwareFoundation/openexr/pull/840</a><br></details> |
| libopenexr22 | CVE-2020-16587 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16587">https://access.redhat.com/security/cve/CVE-2020-16587</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a">https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/issues/491">https://github.com/AcademySoftwareFoundation/openexr/issues/491</a><br><a href="https://ubuntu.com/security/notices/USN-4676-1">https://ubuntu.com/security/notices/USN-4676-1</a><br></details> |
| libopenexr22 | CVE-2021-20296 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20296">https://access.redhat.com/security/cve/CVE-2021-20296</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939141">https://bugzilla.redhat.com/show_bug.cgi?id=1939141</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br><a href="https://www.openexr.com/">https://www.openexr.com/</a><br></details> |
| libopenexr22 | CVE-2021-20300 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20300">https://access.redhat.com/security/cve/CVE-2021-20300</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939153">https://bugzilla.redhat.com/show_bug.cgi?id=1939153</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/836">https://github.com/AcademySoftwareFoundation/openexr/pull/836</a><br></details> |
| libopenexr22 | CVE-2021-20302 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20302">https://access.redhat.com/security/cve/CVE-2021-20302</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939161">https://bugzilla.redhat.com/show_bug.cgi?id=1939161</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/842">https://github.com/AcademySoftwareFoundation/openexr/pull/842</a><br></details> |
| libopenexr22 | CVE-2021-20303 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20303">https://access.redhat.com/security/cve/CVE-2021-20303</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939151">https://bugzilla.redhat.com/show_bug.cgi?id=1939151</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/831">https://github.com/AcademySoftwareFoundation/openexr/pull/831</a><br></details> |
| libopenexr22 | CVE-2021-23215 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23215">https://access.redhat.com/security/cve/CVE-2021-23215</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947586">https://bugzilla.redhat.com/show_bug.cgi?id=1947586</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/901">https://github.com/AcademySoftwareFoundation/openexr/pull/901</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr22 | CVE-2021-26260 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-26260">https://access.redhat.com/security/cve/CVE-2021-26260</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947582">https://bugzilla.redhat.com/show_bug.cgi?id=1947582</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/894">https://github.com/AcademySoftwareFoundation/openexr/pull/894</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr22 | CVE-2021-3474 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3474">https://access.redhat.com/security/cve/CVE-2021-3474</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939142">https://bugzilla.redhat.com/show_bug.cgi?id=1939142</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://security.gentoo.org/glsa/202107-27">https://security.gentoo.org/glsa/202107-27</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com/">https://www.openexr.com/</a><br></details> |
| libopenexr22 | CVE-2021-3475 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3475">https://access.redhat.com/security/cve/CVE-2021-3475</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939144">https://bugzilla.redhat.com/show_bug.cgi?id=1939144</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr22 | CVE-2021-3476 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3476">https://access.redhat.com/security/cve/CVE-2021-3476</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939145">https://bugzilla.redhat.com/show_bug.cgi?id=1939145</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr22 | CVE-2021-3477 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3477">https://access.redhat.com/security/cve/CVE-2021-3477</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939159">https://bugzilla.redhat.com/show_bug.cgi?id=1939159</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://security.gentoo.org/glsa/202107-27">https://security.gentoo.org/glsa/202107-27</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr22 | CVE-2021-3478 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3478">https://access.redhat.com/security/cve/CVE-2021-3478</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939160">https://bugzilla.redhat.com/show_bug.cgi?id=1939160</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com/">https://www.openexr.com/</a><br></details> |
| libopenexr22 | CVE-2021-3479 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3479">https://access.redhat.com/security/cve/CVE-2021-3479</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939149">https://bugzilla.redhat.com/show_bug.cgi?id=1939149</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href="https://ubuntu.com/security/notices/USN-4900-1">https://ubuntu.com/security/notices/USN-4900-1</a><br><a href="https://www.openexr.com">https://www.openexr.com</a><br></details> |
| libopenexr22 | CVE-2021-3598 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3598">https://access.redhat.com/security/cve/CVE-2021-3598</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970987">https://bugzilla.redhat.com/show_bug.cgi?id=1970987</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1037">https://github.com/AcademySoftwareFoundation/openexr/pull/1037</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr22 | CVE-2021-3605 | MEDIUM | 2.2.0-11+deb9u2 | 2.2.0-11+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3605">https://access.redhat.com/security/cve/CVE-2021-3605</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970991">https://bugzilla.redhat.com/show_bug.cgi?id=1970991</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1036">https://github.com/AcademySoftwareFoundation/openexr/pull/1036</a><br><a href="https://ubuntu.com/security/notices/USN-4996-1">https://ubuntu.com/security/notices/USN-4996-1</a><br><a href="https://ubuntu.com/security/notices/USN-4996-2">https://ubuntu.com/security/notices/USN-4996-2</a><br></details> |
| libopenexr22 | CVE-2021-3941 | MEDIUM | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3941">https://access.redhat.com/security/cve/CVE-2021-3941</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019789">https://bugzilla.redhat.com/show_bug.cgi?id=2019789</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1153">https://github.com/AcademySoftwareFoundation/openexr/pull/1153</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/</a><br><a href="https://ubuntu.com/security/notices/USN-5150-1">https://ubuntu.com/security/notices/USN-5150-1</a><br></details> |
| libopenexr22 | CVE-2021-45942 | MEDIUM | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45942">https://access.redhat.com/security/cve/CVE-2021-45942</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022">https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e">https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0">https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1209">https://github.com/AcademySoftwareFoundation/openexr/pull/1209</a><br><a href="https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4">https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml</a><br></details> |
| libopenexr22 | CVE-2017-14988 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14988">https://access.redhat.com/security/cve/CVE-2017-14988</a><br><a href="https://github.com/openexr/openexr/issues/248">https://github.com/openexr/openexr/issues/248</a><br></details> |
| libopenexr22 | CVE-2018-18443 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-18443">https://access.redhat.com/security/cve/CVE-2018-18443</a><br><a href="https://github.com/openexr/openexr/issues/350">https://github.com/openexr/openexr/issues/350</a><br><a href="https://github.com/openexr/openexr/releases/tag/v2.4.0">https://github.com/openexr/openexr/releases/tag/v2.4.0</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/</a><br></details> |
| libopenexr22 | CVE-2021-20304 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20304">https://access.redhat.com/security/cve/CVE-2021-20304</a><br></details> |
| libopenexr22 | CVE-2021-26945 | LOW | 2.2.0-11+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-26945">https://access.redhat.com/security/cve/CVE-2021-26945</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947591">https://bugzilla.redhat.com/show_bug.cgi?id=1947591</a><br></details> |
| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3575">https://access.redhat.com/security/cve/CVE-2021-3575</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1957616">https://bugzilla.redhat.com/show_bug.cgi?id=1957616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1347">https://github.com/uclouvain/openjpeg/issues/1347</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3575.html">https://linux.oracle.com/cve/CVE-2021-3575.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3575">https://ubuntu.com/security/CVE-2021-3575</a><br></details> |
| libopenjp2-7 | CVE-2020-27842 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27842">https://access.redhat.com/security/cve/CVE-2020-27842</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1907513">https://bugzilla.redhat.com/show_bug.cgi?id=1907513</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27842.html">https://linux.oracle.com/cve/CVE-2020-27842.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/</a><br><a href="https://security.gentoo.org/glsa/202101-29">https://security.gentoo.org/glsa/202101-29</a><br><a href="https://ubuntu.com/security/notices/USN-4685-1">https://ubuntu.com/security/notices/USN-4685-1</a><br><a href="https://ubuntu.com/security/notices/USN-4686-1">https://ubuntu.com/security/notices/USN-4686-1</a><br><a href="https://www.debian.org/security/2021/dsa-4882">https://www.debian.org/security/2021/dsa-4882</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
| libopenjp2-7 | CVE-2020-27843 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27843">https://access.redhat.com/security/cve/CVE-2020-27843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1907516">https://bugzilla.redhat.com/show_bug.cgi?id=1907516</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27843.html">https://linux.oracle.com/cve/CVE-2020-27843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/</a><br><a href="https://security.gentoo.org/glsa/202101-29">https://security.gentoo.org/glsa/202101-29</a><br><a href="https://ubuntu.com/security/notices/USN-4685-1">https://ubuntu.com/security/notices/USN-4685-1</a><br><a href="https://ubuntu.com/security/notices/USN-4686-1">https://ubuntu.com/security/notices/USN-4686-1</a><br><a href="https://www.debian.org/security/2021/dsa-4882">https://www.debian.org/security/2021/dsa-4882</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29338">https://access.redhat.com/security/cve/CVE-2021-29338</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1338">https://github.com/uclouvain/openjpeg/issues/1338</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1346">https://github.com/uclouvain/openjpeg/pull/1346</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1395">https://github.com/uclouvain/openjpeg/pull/1395</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1396">https://github.com/uclouvain/openjpeg/pull/1396</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1397">https://github.com/uclouvain/openjpeg/pull/1397</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1398">https://github.com/uclouvain/openjpeg/pull/1398</a><br><a href="https://linux.oracle.com/cve/CVE-2021-29338.html">https://linux.oracle.com/cve/CVE-2021-29338.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/</a><br></details> |
| libopenjp2-7 | CVE-2022-1122 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1122">https://access.redhat.com/security/cve/CVE-2022-1122</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1368">https://github.com/uclouvain/openjpeg/issues/1368</a><br></details> |
| libopenjp2-7 | CVE-2016-10505 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2016-10505">https://access.redhat.com/security/cve/CVE-2016-10505</a><br><a href="https://github.com/uclouvain/openjpeg/issues/776">https://github.com/uclouvain/openjpeg/issues/776</a><br><a href="https://github.com/uclouvain/openjpeg/issues/784">https://github.com/uclouvain/openjpeg/issues/784</a><br><a href="https://github.com/uclouvain/openjpeg/issues/785">https://github.com/uclouvain/openjpeg/issues/785</a><br><a href="https://github.com/uclouvain/openjpeg/issues/792">https://github.com/uclouvain/openjpeg/issues/792</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-10506 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100573">http://www.securityfocus.com/bid/100573</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10506">https://access.redhat.com/security/cve/CVE-2016-10506</a><br><a href="https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b">https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b</a><br><a href="https://github.com/uclouvain/openjpeg/issues/731">https://github.com/uclouvain/openjpeg/issues/731</a><br><a href="https://github.com/uclouvain/openjpeg/issues/732">https://github.com/uclouvain/openjpeg/issues/732</a><br><a href="https://github.com/uclouvain/openjpeg/issues/777">https://github.com/uclouvain/openjpeg/issues/777</a><br><a href="https://github.com/uclouvain/openjpeg/issues/778">https://github.com/uclouvain/openjpeg/issues/778</a><br><a href="https://github.com/uclouvain/openjpeg/issues/779">https://github.com/uclouvain/openjpeg/issues/779</a><br><a href="https://github.com/uclouvain/openjpeg/issues/780">https://github.com/uclouvain/openjpeg/issues/780</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9113 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93980">http://www.securityfocus.com/bid/93980</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9113">https://access.redhat.com/security/cve/CVE-2016-9113</a><br><a href="https://github.com/uclouvain/openjpeg/issues/856">https://github.com/uclouvain/openjpeg/issues/856</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9114 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93979">http://www.securityfocus.com/bid/93979</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9114">https://access.redhat.com/security/cve/CVE-2016-9114</a><br><a href="https://github.com/uclouvain/openjpeg/issues/857">https://github.com/uclouvain/openjpeg/issues/857</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9115 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93977">http://www.securityfocus.com/bid/93977</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9115">https://access.redhat.com/security/cve/CVE-2016-9115</a><br><a href="https://github.com/uclouvain/openjpeg/issues/858">https://github.com/uclouvain/openjpeg/issues/858</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9116 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93975">http://www.securityfocus.com/bid/93975</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9116">https://access.redhat.com/security/cve/CVE-2016-9116</a><br><a href="https://github.com/uclouvain/openjpeg/issues/859">https://github.com/uclouvain/openjpeg/issues/859</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9117 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93783">http://www.securityfocus.com/bid/93783</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9117">https://access.redhat.com/security/cve/CVE-2016-9117</a><br><a href="https://github.com/uclouvain/openjpeg/issues/860">https://github.com/uclouvain/openjpeg/issues/860</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9580 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94822">http://www.securityfocus.com/bid/94822</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9580">https://access.redhat.com/security/cve/CVE-2016-9580</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580</a><br><a href="https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255">https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255</a><br><a href="https://github.com/uclouvain/openjpeg/issues/871">https://github.com/uclouvain/openjpeg/issues/871</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2016-9581 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94822">http://www.securityfocus.com/bid/94822</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9581">https://access.redhat.com/security/cve/CVE-2016-9581</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581</a><br><a href="https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255">https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255</a><br><a href="https://github.com/uclouvain/openjpeg/issues/872">https://github.com/uclouvain/openjpeg/issues/872</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2017-12982 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12982">https://access.redhat.com/security/cve/CVE-2017-12982</a><br><a href="https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/">https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982</a><br><a href="https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7">https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7</a><br><a href="https://github.com/uclouvain/openjpeg/issues/983">https://github.com/uclouvain/openjpeg/issues/983</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7 | CVE-2017-17479 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17479">https://access.redhat.com/security/cve/CVE-2017-17479</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1044">https://github.com/uclouvain/openjpeg/issues/1044</a><br></details> |
| libopenjp2-7 | CVE-2018-16375 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105266">http://www.securityfocus.com/bid/105266</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16375">https://access.redhat.com/security/cve/CVE-2018-16375</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1126">https://github.com/uclouvain/openjpeg/issues/1126</a><br></details> |
| libopenjp2-7 | CVE-2018-16376 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105262">http://www.securityfocus.com/bid/105262</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16376">https://access.redhat.com/security/cve/CVE-2018-16376</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1127">https://github.com/uclouvain/openjpeg/issues/1127</a><br></details> |
| libopenjp2-7 | CVE-2018-20845 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108921">http://www.securityfocus.com/bid/108921</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20845">https://access.redhat.com/security/cve/CVE-2018-20845</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf">https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf</a><br><a href="https://linux.oracle.com/cve/CVE-2018-20845.html">https://linux.oracle.com/cve/CVE-2018-20845.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br></details> |
| libopenjp2-7 | CVE-2018-20846 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108921">http://www.securityfocus.com/bid/108921</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20846">https://access.redhat.com/security/cve/CVE-2018-20846</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc">https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc</a><br></details> |
| libopenjp2-7 | CVE-2018-5727 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5727">https://access.redhat.com/security/cve/CVE-2018-5727</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1053">https://github.com/uclouvain/openjpeg/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5727.html">https://linux.oracle.com/cve/CVE-2018-5727.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://ubuntu.com/security/notices/USN-4686-1">https://ubuntu.com/security/notices/USN-4686-1</a><br></details> |
| libopenjp2-7 | CVE-2018-7648 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d">https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1088">https://github.com/uclouvain/openjpeg/issues/1088</a><br></details> |
| libopenjp2-7 | CVE-2019-6988 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106785">http://www.securityfocus.com/bid/106785</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6988">https://access.redhat.com/security/cve/CVE-2019-6988</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1178">https://github.com/uclouvain/openjpeg/issues/1178</a><br></details> |
| libopenjp2-7-dev | CVE-2021-3575 | HIGH | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3575">https://access.redhat.com/security/cve/CVE-2021-3575</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1957616">https://bugzilla.redhat.com/show_bug.cgi?id=1957616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1347">https://github.com/uclouvain/openjpeg/issues/1347</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3575.html">https://linux.oracle.com/cve/CVE-2021-3575.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3575">https://ubuntu.com/security/CVE-2021-3575</a><br></details> |
| libopenjp2-7-dev | CVE-2020-27842 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27842">https://access.redhat.com/security/cve/CVE-2020-27842</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1907513">https://bugzilla.redhat.com/show_bug.cgi?id=1907513</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27842.html">https://linux.oracle.com/cve/CVE-2020-27842.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/</a><br><a href="https://security.gentoo.org/glsa/202101-29">https://security.gentoo.org/glsa/202101-29</a><br><a href="https://ubuntu.com/security/notices/USN-4685-1">https://ubuntu.com/security/notices/USN-4685-1</a><br><a href="https://ubuntu.com/security/notices/USN-4686-1">https://ubuntu.com/security/notices/USN-4686-1</a><br><a href="https://www.debian.org/security/2021/dsa-4882">https://www.debian.org/security/2021/dsa-4882</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
| libopenjp2-7-dev | CVE-2020-27843 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27843">https://access.redhat.com/security/cve/CVE-2020-27843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1907516">https://bugzilla.redhat.com/show_bug.cgi?id=1907516</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27843.html">https://linux.oracle.com/cve/CVE-2020-27843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/</a><br><a href="https://security.gentoo.org/glsa/202101-29">https://security.gentoo.org/glsa/202101-29</a><br><a href="https://ubuntu.com/security/notices/USN-4685-1">https://ubuntu.com/security/notices/USN-4685-1</a><br><a href="https://ubuntu.com/security/notices/USN-4686-1">https://ubuntu.com/security/notices/USN-4686-1</a><br><a href="https://www.debian.org/security/2021/dsa-4882">https://www.debian.org/security/2021/dsa-4882</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
| libopenjp2-7-dev | CVE-2021-29338 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29338">https://access.redhat.com/security/cve/CVE-2021-29338</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1338">https://github.com/uclouvain/openjpeg/issues/1338</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1346">https://github.com/uclouvain/openjpeg/pull/1346</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1395">https://github.com/uclouvain/openjpeg/pull/1395</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1396">https://github.com/uclouvain/openjpeg/pull/1396</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1397">https://github.com/uclouvain/openjpeg/pull/1397</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1398">https://github.com/uclouvain/openjpeg/pull/1398</a><br><a href="https://linux.oracle.com/cve/CVE-2021-29338.html">https://linux.oracle.com/cve/CVE-2021-29338.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/</a><br></details> |
| libopenjp2-7-dev | CVE-2022-1122 | MEDIUM | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1122">https://access.redhat.com/security/cve/CVE-2022-1122</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1368">https://github.com/uclouvain/openjpeg/issues/1368</a><br></details> |
| libopenjp2-7-dev | CVE-2016-10505 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2016-10505">https://access.redhat.com/security/cve/CVE-2016-10505</a><br><a href="https://github.com/uclouvain/openjpeg/issues/776">https://github.com/uclouvain/openjpeg/issues/776</a><br><a href="https://github.com/uclouvain/openjpeg/issues/784">https://github.com/uclouvain/openjpeg/issues/784</a><br><a href="https://github.com/uclouvain/openjpeg/issues/785">https://github.com/uclouvain/openjpeg/issues/785</a><br><a href="https://github.com/uclouvain/openjpeg/issues/792">https://github.com/uclouvain/openjpeg/issues/792</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-10506 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100573">http://www.securityfocus.com/bid/100573</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10506">https://access.redhat.com/security/cve/CVE-2016-10506</a><br><a href="https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b">https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b</a><br><a href="https://github.com/uclouvain/openjpeg/issues/731">https://github.com/uclouvain/openjpeg/issues/731</a><br><a href="https://github.com/uclouvain/openjpeg/issues/732">https://github.com/uclouvain/openjpeg/issues/732</a><br><a href="https://github.com/uclouvain/openjpeg/issues/777">https://github.com/uclouvain/openjpeg/issues/777</a><br><a href="https://github.com/uclouvain/openjpeg/issues/778">https://github.com/uclouvain/openjpeg/issues/778</a><br><a href="https://github.com/uclouvain/openjpeg/issues/779">https://github.com/uclouvain/openjpeg/issues/779</a><br><a href="https://github.com/uclouvain/openjpeg/issues/780">https://github.com/uclouvain/openjpeg/issues/780</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9113 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93980">http://www.securityfocus.com/bid/93980</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9113">https://access.redhat.com/security/cve/CVE-2016-9113</a><br><a href="https://github.com/uclouvain/openjpeg/issues/856">https://github.com/uclouvain/openjpeg/issues/856</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9114 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93979">http://www.securityfocus.com/bid/93979</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9114">https://access.redhat.com/security/cve/CVE-2016-9114</a><br><a href="https://github.com/uclouvain/openjpeg/issues/857">https://github.com/uclouvain/openjpeg/issues/857</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9115 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93977">http://www.securityfocus.com/bid/93977</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9115">https://access.redhat.com/security/cve/CVE-2016-9115</a><br><a href="https://github.com/uclouvain/openjpeg/issues/858">https://github.com/uclouvain/openjpeg/issues/858</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9116 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93975">http://www.securityfocus.com/bid/93975</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9116">https://access.redhat.com/security/cve/CVE-2016-9116</a><br><a href="https://github.com/uclouvain/openjpeg/issues/859">https://github.com/uclouvain/openjpeg/issues/859</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9117 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/93783">http://www.securityfocus.com/bid/93783</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9117">https://access.redhat.com/security/cve/CVE-2016-9117</a><br><a href="https://github.com/uclouvain/openjpeg/issues/860">https://github.com/uclouvain/openjpeg/issues/860</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9580 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94822">http://www.securityfocus.com/bid/94822</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9580">https://access.redhat.com/security/cve/CVE-2016-9580</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580</a><br><a href="https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255">https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255</a><br><a href="https://github.com/uclouvain/openjpeg/issues/871">https://github.com/uclouvain/openjpeg/issues/871</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2016-9581 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94822">http://www.securityfocus.com/bid/94822</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9581">https://access.redhat.com/security/cve/CVE-2016-9581</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581</a><br><a href="https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255">https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255</a><br><a href="https://github.com/uclouvain/openjpeg/issues/872">https://github.com/uclouvain/openjpeg/issues/872</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2017-12982 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12982">https://access.redhat.com/security/cve/CVE-2017-12982</a><br><a href="https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/">https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982</a><br><a href="https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7">https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7</a><br><a href="https://github.com/uclouvain/openjpeg/issues/983">https://github.com/uclouvain/openjpeg/issues/983</a><br><a href="https://security.gentoo.org/glsa/201710-26">https://security.gentoo.org/glsa/201710-26</a><br></details> |
| libopenjp2-7-dev | CVE-2017-17479 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-17479">https://access.redhat.com/security/cve/CVE-2017-17479</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1044">https://github.com/uclouvain/openjpeg/issues/1044</a><br></details> |
| libopenjp2-7-dev | CVE-2018-16375 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105266">http://www.securityfocus.com/bid/105266</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16375">https://access.redhat.com/security/cve/CVE-2018-16375</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1126">https://github.com/uclouvain/openjpeg/issues/1126</a><br></details> |
| libopenjp2-7-dev | CVE-2018-16376 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105262">http://www.securityfocus.com/bid/105262</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16376">https://access.redhat.com/security/cve/CVE-2018-16376</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1127">https://github.com/uclouvain/openjpeg/issues/1127</a><br></details> |
| libopenjp2-7-dev | CVE-2018-20845 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108921">http://www.securityfocus.com/bid/108921</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20845">https://access.redhat.com/security/cve/CVE-2018-20845</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf">https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf</a><br><a href="https://linux.oracle.com/cve/CVE-2018-20845.html">https://linux.oracle.com/cve/CVE-2018-20845.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br></details> |
| libopenjp2-7-dev | CVE-2018-20846 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108921">http://www.securityfocus.com/bid/108921</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20846">https://access.redhat.com/security/cve/CVE-2018-20846</a><br><a href="https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc">https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc</a><br></details> |
| libopenjp2-7-dev | CVE-2018-5727 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5727">https://access.redhat.com/security/cve/CVE-2018-5727</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1053">https://github.com/uclouvain/openjpeg/issues/1053</a><br><a href="https://linux.oracle.com/cve/CVE-2018-5727.html">https://linux.oracle.com/cve/CVE-2018-5727.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4251.html">https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href="https://ubuntu.com/security/notices/USN-4686-1">https://ubuntu.com/security/notices/USN-4686-1</a><br></details> |
| libopenjp2-7-dev | CVE-2018-7648 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d">https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1088">https://github.com/uclouvain/openjpeg/issues/1088</a><br></details> |
| libopenjp2-7-dev | CVE-2019-6988 | LOW | 2.1.2-1.1+deb9u6 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106785">http://www.securityfocus.com/bid/106785</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6988">https://access.redhat.com/security/cve/CVE-2019-6988</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988</a><br><a href="https://github.com/uclouvain/openjpeg/issues/1178">https://github.com/uclouvain/openjpeg/issues/1178</a><br></details> |
| libpathplan4 | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libpathplan4 | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libpathplan4 | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libpathplan4 | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libpcre16-3 | CVE-2020-14155 | MEDIUM | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre16-3 | CVE-2017-11164 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre16-3 | CVE-2017-16231 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre16-3 | CVE-2017-7245 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre16-3 | CVE-2017-7246 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre16-3 | CVE-2019-20838 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3-dev | CVE-2020-14155 | MEDIUM | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3-dev | CVE-2017-11164 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre3-dev | CVE-2017-16231 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre3-dev | CVE-2017-7245 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3-dev | CVE-2017-7246 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3-dev | CVE-2019-20838 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre32-3 | CVE-2020-14155 | MEDIUM | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre32-3 | CVE-2017-11164 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre32-3 | CVE-2017-16231 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre32-3 | CVE-2017-7245 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre32-3 | CVE-2017-7246 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre32-3 | CVE-2019-20838 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcrecpp0v5 | CVE-2020-14155 | MEDIUM | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcrecpp0v5 | CVE-2017-11164 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcrecpp0v5 | CVE-2017-16231 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcrecpp0v5 | CVE-2017-7245 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcrecpp0v5 | CVE-2017-7246 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcrecpp0v5 | CVE-2019-20838 | LOW | 2:8.39-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libperl5.24 | CVE-2020-16156 | HIGH | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c">https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| libperl5.24 | CVE-2011-4116 | LOW | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| libpng-dev | CVE-2017-12652 | CRITICAL | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109269">http://www.securityfocus.com/bid/109269</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12652">https://access.redhat.com/security/cve/CVE-2017-12652</a><br><a href="https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE">https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12652.html">https://linux.oracle.com/cve/CVE-2017-12652.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3901.html">https://linux.oracle.com/errata/ELSA-2020-3901.html</a><br><a href="https://support.f5.com/csp/article/K88124225">https://support.f5.com/csp/article/K88124225</a><br><a href="https://support.f5.com/csp/article/K88124225?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K88124225?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libpng-dev | CVE-2018-14048 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html">http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html</a><br><a href="http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html">http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-14048">https://access.redhat.com/security/cve/CVE-2018-14048</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048</a><br><a href="https://github.com/fouzhe/security/tree/master/libpng">https://github.com/fouzhe/security/tree/master/libpng</a><br><a href="https://github.com/glennrp/libpng/issues/238">https://github.com/glennrp/libpng/issues/238</a><br><a href="https://seclists.org/bugtraq/2019/Apr/30">https://seclists.org/bugtraq/2019/Apr/30</a><br><a href="https://security.gentoo.org/glsa/201908-02">https://security.gentoo.org/glsa/201908-02</a><br></details> |
| libpng-dev | CVE-2018-14550 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14550">https://access.redhat.com/security/cve/CVE-2018-14550</a><br><a href="https://github.com/advisories/GHSA-qwwr-qc2p-6283">https://github.com/advisories/GHSA-qwwr-qc2p-6283</a><br><a href="https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token">https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token</a><br><a href="https://github.com/glennrp/libpng/issues/246">https://github.com/glennrp/libpng/issues/246</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14550">https://nvd.nist.gov/vuln/detail/CVE-2018-14550</a><br><a href="https://security.gentoo.org/glsa/201908-02">https://security.gentoo.org/glsa/201908-02</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612">https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpng-dev | CVE-2019-6129 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6129">https://access.redhat.com/security/cve/CVE-2019-6129</a><br><a href="https://github.com/glennrp/libpng/issues/269">https://github.com/glennrp/libpng/issues/269</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a><br></details> |
| libpng-dev | CVE-2021-4214 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4214">https://access.redhat.com/security/cve/CVE-2021-4214</a><br></details> |
| libpng16-16 | CVE-2017-12652 | CRITICAL | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109269">http://www.securityfocus.com/bid/109269</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12652">https://access.redhat.com/security/cve/CVE-2017-12652</a><br><a href="https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE">https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12652.html">https://linux.oracle.com/cve/CVE-2017-12652.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3901.html">https://linux.oracle.com/errata/ELSA-2020-3901.html</a><br><a href="https://support.f5.com/csp/article/K88124225">https://support.f5.com/csp/article/K88124225</a><br><a href="https://support.f5.com/csp/article/K88124225?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K88124225?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libpng16-16 | CVE-2018-14048 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html">http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html</a><br><a href="http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html">http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-14048">https://access.redhat.com/security/cve/CVE-2018-14048</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048</a><br><a href="https://github.com/fouzhe/security/tree/master/libpng">https://github.com/fouzhe/security/tree/master/libpng</a><br><a href="https://github.com/glennrp/libpng/issues/238">https://github.com/glennrp/libpng/issues/238</a><br><a href="https://seclists.org/bugtraq/2019/Apr/30">https://seclists.org/bugtraq/2019/Apr/30</a><br><a href="https://security.gentoo.org/glsa/201908-02">https://security.gentoo.org/glsa/201908-02</a><br></details> |
| libpng16-16 | CVE-2018-14550 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-14550">https://access.redhat.com/security/cve/CVE-2018-14550</a><br><a href="https://github.com/advisories/GHSA-qwwr-qc2p-6283">https://github.com/advisories/GHSA-qwwr-qc2p-6283</a><br><a href="https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token">https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token</a><br><a href="https://github.com/glennrp/libpng/issues/246">https://github.com/glennrp/libpng/issues/246</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14550">https://nvd.nist.gov/vuln/detail/CVE-2018-14550</a><br><a href="https://security.gentoo.org/glsa/201908-02">https://security.gentoo.org/glsa/201908-02</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612">https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpng16-16 | CVE-2019-6129 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6129">https://access.redhat.com/security/cve/CVE-2019-6129</a><br><a href="https://github.com/glennrp/libpng/issues/269">https://github.com/glennrp/libpng/issues/269</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a><br></details> |
| libpng16-16 | CVE-2021-4214 | LOW | 1.6.28-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4214">https://access.redhat.com/security/cve/CVE-2021-4214</a><br></details> |
| libpq-dev | CVE-2021-23214 | HIGH | 9.6.20-0+deb9u1 | 9.6.24-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23214">https://access.redhat.com/security/cve/CVE-2021-23214</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022666">https://bugzilla.redhat.com/show_bug.cgi?id=2022666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951</a><br><a href="https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951">https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23214.html">https://linux.oracle.com/cve/CVE-2021-23214.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-5236.html">https://linux.oracle.com/errata/ELSA-2021-5236.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">https://nvd.nist.gov/vuln/detail/CVE-2021-23214</a><br><a href="https://ubuntu.com/security/notices/USN-5145-1">https://ubuntu.com/security/notices/USN-5145-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/">https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-23214/">https://www.postgresql.org/support/security/CVE-2021-23214/</a><br></details> |
| libpq-dev | CVE-2021-32027 | HIGH | 9.6.20-0+deb9u1 | 9.6.22-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32027">https://access.redhat.com/security/cve/CVE-2021-32027</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956876">https://bugzilla.redhat.com/show_bug.cgi?id=1956876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32027.html">https://linux.oracle.com/cve/CVE-2021-32027.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9428.html">https://linux.oracle.com/errata/ELSA-2021-9428.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">https://nvd.nist.gov/vuln/detail/CVE-2021-32027</a><br><a href="https://security.netapp.com/advisory/ntap-20210713-0004/">https://security.netapp.com/advisory/ntap-20210713-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4972-1">https://ubuntu.com/security/notices/USN-4972-1</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-32027/">https://www.postgresql.org/support/security/CVE-2021-32027/</a><br></details> |
| libpq-dev | CVE-2021-23222 | MEDIUM | 9.6.20-0+deb9u1 | 9.6.24-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23222">https://access.redhat.com/security/cve/CVE-2021-23222</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022675">https://bugzilla.redhat.com/show_bug.cgi?id=2022675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228</a><br><a href="https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45">https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">https://nvd.nist.gov/vuln/detail/CVE-2021-23222</a><br><a href="https://ubuntu.com/security/notices/USN-5145-1">https://ubuntu.com/security/notices/USN-5145-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/">https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-23222/">https://www.postgresql.org/support/security/CVE-2021-23222/</a><br></details> |
| libpq-dev | CVE-2021-32028 | MEDIUM | 9.6.20-0+deb9u1 | 9.6.22-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32028">https://access.redhat.com/security/cve/CVE-2021-32028</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956877">https://bugzilla.redhat.com/show_bug.cgi?id=1956877</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=4a8656a7ee0c155b0249376af58eb3fc3a90415f (REL_13_3)">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=4a8656a7ee0c155b0249376af58eb3fc3a90415f (REL_13_3)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32028.html">https://linux.oracle.com/cve/CVE-2021-32028.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9428.html">https://linux.oracle.com/errata/ELSA-2021-9428.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0003/">https://security.netapp.com/advisory/ntap-20211112-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4972-1">https://ubuntu.com/security/notices/USN-4972-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/">https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-32028">https://www.postgresql.org/support/security/CVE-2021-32028</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-32028/">https://www.postgresql.org/support/security/CVE-2021-32028/</a><br></details> |
| libpq-dev | CVE-2019-9193 | LOW | 9.6.20-0+deb9u1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html">http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html</a><br><a href="http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html">http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9193">https://access.redhat.com/security/cve/CVE-2019-9193</a><br><a href="https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/">https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/</a><br><a href="https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5">https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5</a><br><a href="https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/">https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/</a><br><a href="https://security.netapp.com/advisory/ntap-20190502-0003/">https://security.netapp.com/advisory/ntap-20190502-0003/</a><br><a href="https://www.postgresql.org/about/news/1935/">https://www.postgresql.org/about/news/1935/</a><br><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/</a><br></details> |
| libpq-dev | DLA-2751-1 | UNKNOWN | 9.6.20-0+deb9u1 | 9.6.23-0+deb9u1 | <details><summary>Expand...</summary></details> |
| libpq5 | CVE-2021-23214 | HIGH | 9.6.20-0+deb9u1 | 9.6.24-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23214">https://access.redhat.com/security/cve/CVE-2021-23214</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022666">https://bugzilla.redhat.com/show_bug.cgi?id=2022666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951</a><br><a href="https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951">https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23214.html">https://linux.oracle.com/cve/CVE-2021-23214.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-5236.html">https://linux.oracle.com/errata/ELSA-2021-5236.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">https://nvd.nist.gov/vuln/detail/CVE-2021-23214</a><br><a href="https://ubuntu.com/security/notices/USN-5145-1">https://ubuntu.com/security/notices/USN-5145-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/">https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-23214/">https://www.postgresql.org/support/security/CVE-2021-23214/</a><br></details> |
| libpq5 | CVE-2021-32027 | HIGH | 9.6.20-0+deb9u1 | 9.6.22-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32027">https://access.redhat.com/security/cve/CVE-2021-32027</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956876">https://bugzilla.redhat.com/show_bug.cgi?id=1956876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32027.html">https://linux.oracle.com/cve/CVE-2021-32027.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9428.html">https://linux.oracle.com/errata/ELSA-2021-9428.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">https://nvd.nist.gov/vuln/detail/CVE-2021-32027</a><br><a href="https://security.netapp.com/advisory/ntap-20210713-0004/">https://security.netapp.com/advisory/ntap-20210713-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4972-1">https://ubuntu.com/security/notices/USN-4972-1</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-32027/">https://www.postgresql.org/support/security/CVE-2021-32027/</a><br></details> |
| libpq5 | CVE-2021-23222 | MEDIUM | 9.6.20-0+deb9u1 | 9.6.24-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23222">https://access.redhat.com/security/cve/CVE-2021-23222</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022675">https://bugzilla.redhat.com/show_bug.cgi?id=2022675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228</a><br><a href="https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45">https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">https://nvd.nist.gov/vuln/detail/CVE-2021-23222</a><br><a href="https://ubuntu.com/security/notices/USN-5145-1">https://ubuntu.com/security/notices/USN-5145-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/">https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-23222/">https://www.postgresql.org/support/security/CVE-2021-23222/</a><br></details> |
| libpq5 | CVE-2021-32028 | MEDIUM | 9.6.20-0+deb9u1 | 9.6.22-0+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32028">https://access.redhat.com/security/cve/CVE-2021-32028</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956877">https://bugzilla.redhat.com/show_bug.cgi?id=1956877</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=4a8656a7ee0c155b0249376af58eb3fc3a90415f (REL_13_3)">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=4a8656a7ee0c155b0249376af58eb3fc3a90415f (REL_13_3)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32028.html">https://linux.oracle.com/cve/CVE-2021-32028.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9428.html">https://linux.oracle.com/errata/ELSA-2021-9428.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0003/">https://security.netapp.com/advisory/ntap-20211112-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4972-1">https://ubuntu.com/security/notices/USN-4972-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/">https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-32028">https://www.postgresql.org/support/security/CVE-2021-32028</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-32028/">https://www.postgresql.org/support/security/CVE-2021-32028/</a><br></details> |
| libpq5 | CVE-2019-9193 | LOW | 9.6.20-0+deb9u1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html">http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html</a><br><a href="http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html">http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9193">https://access.redhat.com/security/cve/CVE-2019-9193</a><br><a href="https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/">https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/</a><br><a href="https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5">https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5</a><br><a href="https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/">https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/</a><br><a href="https://security.netapp.com/advisory/ntap-20190502-0003/">https://security.netapp.com/advisory/ntap-20190502-0003/</a><br><a href="https://www.postgresql.org/about/news/1935/">https://www.postgresql.org/about/news/1935/</a><br><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/</a><br></details> |
| libpq5 | DLA-2751-1 | UNKNOWN | 9.6.20-0+deb9u1 | 9.6.23-0+deb9u1 | <details><summary>Expand...</summary></details> |
| libpython-stdlib | CVE-2008-4108 | LOW | 2.7.13-2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899</a><br><a href="http://marc.info/?l=oss-security&amp;m=122148330903513&amp;w=2">http://marc.info/?l=oss-security&amp;m=122148330903513&amp;w=2</a><br><a href="http://marc.info/?l=oss-security&amp;m=122152861617434&amp;w=2">http://marc.info/?l=oss-security&amp;m=122152861617434&amp;w=2</a><br><a href="http://securityreason.com/securityalert/4274">http://securityreason.com/securityalert/4274</a><br><a href="http://www.securityfocus.com/bid/31184">http://www.securityfocus.com/bid/31184</a><br><a href="http://www.securitytracker.com/id?1020904">http://www.securitytracker.com/id?1020904</a><br><a href="http://www.vupen.com/english/advisories/2008/2659">http://www.vupen.com/english/advisories/2008/2659</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-4108">https://access.redhat.com/security/cve/CVE-2008-4108</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=462326">https://bugzilla.redhat.com/show_bug.cgi?id=462326</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/45161">https://exchange.xforce.ibmcloud.com/vulnerabilities/45161</a><br></details> |
| libpython2.7-minimal | CVE-2021-3177 | CRITICAL | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython2.7-minimal | CVE-2019-16935 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16935">https://access.redhat.com/security/cve/CVE-2019-16935</a><br><a href="https://bugs.python.org/issue38243">https://bugs.python.org/issue38243</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935</a><br><a href="https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897">https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897</a><br><a href="https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213">https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213</a><br><a href="https://github.com/python/cpython/pull/16373">https://github.com/python/cpython/pull/16373</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16935.html">https://linux.oracle.com/cve/CVE-2019-16935.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4433.html">https://linux.oracle.com/errata/ELSA-2020-4433.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/</a><br><a href="https://security.netapp.com/advisory/ntap-20191017-0004/">https://security.netapp.com/advisory/ntap-20191017-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4151-1">https://ubuntu.com/security/notices/USN-4151-1</a><br><a href="https://ubuntu.com/security/notices/USN-4151-2">https://ubuntu.com/security/notices/USN-4151-2</a><br><a href="https://usn.ubuntu.com/4151-1/">https://usn.ubuntu.com/4151-1/</a><br><a href="https://usn.ubuntu.com/4151-2/">https://usn.ubuntu.com/4151-2/</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br></details> |
| libpython2.7-minimal | CVE-2021-23336 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython2.7-minimal | CVE-2021-4189 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| libpython2.7-minimal | CVE-2013-7040 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.python.org/issue14621">http://bugs.python.org/issue14621</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/13">http://www.openwall.com/lists/oss-security/2013/12/09/13</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/3">http://www.openwall.com/lists/oss-security/2013/12/09/3</a><br><a href="http://www.securityfocus.com/bid/64194">http://www.securityfocus.com/bid/64194</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-7040">https://access.redhat.com/security/cve/CVE-2013-7040</a><br><a href="https://support.apple.com/kb/HT205031">https://support.apple.com/kb/HT205031</a><br></details> |
| libpython2.7-minimal | CVE-2017-17522 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| libpython2.7-minimal | CVE-2018-1000030 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000030">https://access.redhat.com/security/cve/CVE-2018-1000030</a><br><a href="https://bugs.python.org/issue31530">https://bugs.python.org/issue31530</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030</a><br><a href="https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view">https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view</a><br><a href="https://security.gentoo.org/glsa/201811-02">https://security.gentoo.org/glsa/201811-02</a><br><a href="https://ubuntu.com/security/notices/USN-3817-1">https://ubuntu.com/security/notices/USN-3817-1</a><br><a href="https://ubuntu.com/security/notices/USN-3817-2">https://ubuntu.com/security/notices/USN-3817-2</a><br><a href="https://usn.ubuntu.com/3817-1/">https://usn.ubuntu.com/3817-1/</a><br><a href="https://usn.ubuntu.com/3817-2/">https://usn.ubuntu.com/3817-2/</a><br><a href="https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0">https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libpython2.7-minimal | CVE-2019-18348 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18348">https://access.redhat.com/security/cve/CVE-2019-18348</a><br><a href="https://bugs.python.org/issue30458#msg347282">https://bugs.python.org/issue30458#msg347282</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1727276">https://bugzilla.redhat.com/show_bug.cgi?id=1727276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">https://nvd.nist.gov/vuln/detail/CVE-2019-18348</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0004/">https://security.netapp.com/advisory/ntap-20191107-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libpython2.7-minimal | CVE-2019-9674 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| libpython2.7-minimal | CVE-2020-8492 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-8492">https://access.redhat.com/security/cve/CVE-2020-8492</a><br><a href="https://bugs.python.org/issue39503">https://bugs.python.org/issue39503</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492</a><br><a href="https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4">https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4</a><br><a href="https://github.com/python/cpython/pull/18284">https://github.com/python/cpython/pull/18284</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8492.html">https://linux.oracle.com/cve/CVE-2020-8492.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4641.html">https://linux.oracle.com/errata/ELSA-2020-4641.html</a><br><a href="https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html">https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html</a><br><a href="https://security.gentoo.org/glsa/202005-09">https://security.gentoo.org/glsa/202005-09</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0001/">https://security.netapp.com/advisory/ntap-20200221-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br></details> |
| libpython2.7-stdlib | CVE-2021-3177 | CRITICAL | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython2.7-stdlib | CVE-2019-16935 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16935">https://access.redhat.com/security/cve/CVE-2019-16935</a><br><a href="https://bugs.python.org/issue38243">https://bugs.python.org/issue38243</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935</a><br><a href="https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897">https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897</a><br><a href="https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213">https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213</a><br><a href="https://github.com/python/cpython/pull/16373">https://github.com/python/cpython/pull/16373</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16935.html">https://linux.oracle.com/cve/CVE-2019-16935.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4433.html">https://linux.oracle.com/errata/ELSA-2020-4433.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/</a><br><a href="https://security.netapp.com/advisory/ntap-20191017-0004/">https://security.netapp.com/advisory/ntap-20191017-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4151-1">https://ubuntu.com/security/notices/USN-4151-1</a><br><a href="https://ubuntu.com/security/notices/USN-4151-2">https://ubuntu.com/security/notices/USN-4151-2</a><br><a href="https://usn.ubuntu.com/4151-1/">https://usn.ubuntu.com/4151-1/</a><br><a href="https://usn.ubuntu.com/4151-2/">https://usn.ubuntu.com/4151-2/</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br></details> |
| libpython2.7-stdlib | CVE-2021-23336 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython2.7-stdlib | CVE-2021-4189 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| libpython2.7-stdlib | CVE-2013-7040 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.python.org/issue14621">http://bugs.python.org/issue14621</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/13">http://www.openwall.com/lists/oss-security/2013/12/09/13</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/3">http://www.openwall.com/lists/oss-security/2013/12/09/3</a><br><a href="http://www.securityfocus.com/bid/64194">http://www.securityfocus.com/bid/64194</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-7040">https://access.redhat.com/security/cve/CVE-2013-7040</a><br><a href="https://support.apple.com/kb/HT205031">https://support.apple.com/kb/HT205031</a><br></details> |
| libpython2.7-stdlib | CVE-2017-17522 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| libpython2.7-stdlib | CVE-2018-1000030 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000030">https://access.redhat.com/security/cve/CVE-2018-1000030</a><br><a href="https://bugs.python.org/issue31530">https://bugs.python.org/issue31530</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030</a><br><a href="https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view">https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view</a><br><a href="https://security.gentoo.org/glsa/201811-02">https://security.gentoo.org/glsa/201811-02</a><br><a href="https://ubuntu.com/security/notices/USN-3817-1">https://ubuntu.com/security/notices/USN-3817-1</a><br><a href="https://ubuntu.com/security/notices/USN-3817-2">https://ubuntu.com/security/notices/USN-3817-2</a><br><a href="https://usn.ubuntu.com/3817-1/">https://usn.ubuntu.com/3817-1/</a><br><a href="https://usn.ubuntu.com/3817-2/">https://usn.ubuntu.com/3817-2/</a><br><a href="https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0">https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libpython2.7-stdlib | CVE-2019-18348 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18348">https://access.redhat.com/security/cve/CVE-2019-18348</a><br><a href="https://bugs.python.org/issue30458#msg347282">https://bugs.python.org/issue30458#msg347282</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1727276">https://bugzilla.redhat.com/show_bug.cgi?id=1727276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">https://nvd.nist.gov/vuln/detail/CVE-2019-18348</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0004/">https://security.netapp.com/advisory/ntap-20191107-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libpython2.7-stdlib | CVE-2019-9674 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| libpython2.7-stdlib | CVE-2020-8492 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-8492">https://access.redhat.com/security/cve/CVE-2020-8492</a><br><a href="https://bugs.python.org/issue39503">https://bugs.python.org/issue39503</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492</a><br><a href="https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4">https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4</a><br><a href="https://github.com/python/cpython/pull/18284">https://github.com/python/cpython/pull/18284</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8492.html">https://linux.oracle.com/cve/CVE-2020-8492.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4641.html">https://linux.oracle.com/errata/ELSA-2020-4641.html</a><br><a href="https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html">https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html</a><br><a href="https://security.gentoo.org/glsa/202005-09">https://security.gentoo.org/glsa/202005-09</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0001/">https://security.netapp.com/advisory/ntap-20200221-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br></details> |
| libpython3.5-minimal | CVE-2021-3177 | CRITICAL | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython3.5-minimal | CVE-2021-3737 | HIGH | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3737">https://access.redhat.com/security/cve/CVE-2021-3737</a><br><a href="https://bugs.python.org/issue44022">https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href="https://github.com/python/cpython/pull/25916">https://github.com/python/cpython/pull/25916</a><br><a href="https://github.com/python/cpython/pull/26503">https://github.com/python/cpython/pull/26503</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3737.html">https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">https://nvd.nist.gov/vuln/detail/CVE-2021-3737</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html">https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3737">https://ubuntu.com/security/CVE-2021-3737</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://ubuntu.com/security/notices/USN-5201-1">https://ubuntu.com/security/notices/USN-5201-1</a><br></details> |
| libpython3.5-minimal | CVE-2022-0391 | HIGH | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0391">https://access.redhat.com/security/cve/CVE-2022-0391</a><br><a href="https://bugs.python.org/issue43882">https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">https://nvd.nist.gov/vuln/detail/CVE-2022-0391</a><br><a href="https://security.netapp.com/advisory/ntap-20220225-0009/">https://security.netapp.com/advisory/ntap-20220225-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| libpython3.5-minimal | CVE-2021-23336 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython3.5-minimal | CVE-2021-3426 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3426">https://access.redhat.com/security/cve/CVE-2021-3426</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1935913">https://bugzilla.redhat.com/show_bug.cgi?id=1935913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426</a><br><a href="https://github.com/python/cpython/pull/24285">https://github.com/python/cpython/pull/24285</a><br><a href="https://github.com/python/cpython/pull/24337">https://github.com/python/cpython/pull/24337</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3426.html">https://linux.oracle.com/cve/CVE-2021-3426.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9562.html">https://linux.oracle.com/errata/ELSA-2021-9562.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/</a><br><a href="https://python-security.readthedocs.io/vuln/pydoc-getfile.html">https://python-security.readthedocs.io/vuln/pydoc-getfile.html</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0003/">https://security.netapp.com/advisory/ntap-20210629-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython3.5-minimal | CVE-2021-3733 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3733">https://access.redhat.com/security/cve/CVE-2021-3733</a><br><a href="https://bugs.python.org/issue43075">https://bugs.python.org/issue43075</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995234">https://bugzilla.redhat.com/show_bug.cgi?id=1995234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733</a><br><a href="https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final">https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final</a><br><a href="https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final">https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final</a><br><a href="https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final">https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final</a><br><a href="https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final">https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final</a><br><a href="https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)">https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)</a><br><a href="https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)">https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)</a><br><a href="https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)">https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)</a><br><a href="https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)">https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)</a><br><a href="https://github.com/python/cpython/pull/24391">https://github.com/python/cpython/pull/24391</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3733.html">https://linux.oracle.com/cve/CVE-2021-3733.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3733">https://ubuntu.com/security/CVE-2021-3733</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br></details> |
| libpython3.5-minimal | CVE-2021-4189 | MEDIUM | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| libpython3.5-minimal | CVE-2017-17522 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| libpython3.5-minimal | CVE-2019-9674 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| libpython3.5-stdlib | CVE-2021-3177 | CRITICAL | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython3.5-stdlib | CVE-2021-3737 | HIGH | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3737">https://access.redhat.com/security/cve/CVE-2021-3737</a><br><a href="https://bugs.python.org/issue44022">https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href="https://github.com/python/cpython/pull/25916">https://github.com/python/cpython/pull/25916</a><br><a href="https://github.com/python/cpython/pull/26503">https://github.com/python/cpython/pull/26503</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3737.html">https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">https://nvd.nist.gov/vuln/detail/CVE-2021-3737</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html">https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3737">https://ubuntu.com/security/CVE-2021-3737</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://ubuntu.com/security/notices/USN-5201-1">https://ubuntu.com/security/notices/USN-5201-1</a><br></details> |
| libpython3.5-stdlib | CVE-2022-0391 | HIGH | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0391">https://access.redhat.com/security/cve/CVE-2022-0391</a><br><a href="https://bugs.python.org/issue43882">https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">https://nvd.nist.gov/vuln/detail/CVE-2022-0391</a><br><a href="https://security.netapp.com/advisory/ntap-20220225-0009/">https://security.netapp.com/advisory/ntap-20220225-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| libpython3.5-stdlib | CVE-2021-23336 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython3.5-stdlib | CVE-2021-3426 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3426">https://access.redhat.com/security/cve/CVE-2021-3426</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1935913">https://bugzilla.redhat.com/show_bug.cgi?id=1935913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426</a><br><a href="https://github.com/python/cpython/pull/24285">https://github.com/python/cpython/pull/24285</a><br><a href="https://github.com/python/cpython/pull/24337">https://github.com/python/cpython/pull/24337</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3426.html">https://linux.oracle.com/cve/CVE-2021-3426.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9562.html">https://linux.oracle.com/errata/ELSA-2021-9562.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/</a><br><a href="https://python-security.readthedocs.io/vuln/pydoc-getfile.html">https://python-security.readthedocs.io/vuln/pydoc-getfile.html</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0003/">https://security.netapp.com/advisory/ntap-20210629-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libpython3.5-stdlib | CVE-2021-3733 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3733">https://access.redhat.com/security/cve/CVE-2021-3733</a><br><a href="https://bugs.python.org/issue43075">https://bugs.python.org/issue43075</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995234">https://bugzilla.redhat.com/show_bug.cgi?id=1995234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733</a><br><a href="https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final">https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final</a><br><a href="https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final">https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final</a><br><a href="https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final">https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final</a><br><a href="https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final">https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final</a><br><a href="https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)">https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)</a><br><a href="https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)">https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)</a><br><a href="https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)">https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)</a><br><a href="https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)">https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)</a><br><a href="https://github.com/python/cpython/pull/24391">https://github.com/python/cpython/pull/24391</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3733.html">https://linux.oracle.com/cve/CVE-2021-3733.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3733">https://ubuntu.com/security/CVE-2021-3733</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br></details> |
| libpython3.5-stdlib | CVE-2021-4189 | MEDIUM | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| libpython3.5-stdlib | CVE-2017-17522 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| libpython3.5-stdlib | CVE-2019-9674 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| libquadmath0 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libsasl2-2 | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3+deb9u1 | 2.1.27~101-g0780600+dfsg-3+deb9u2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/23/4">http://www.openwall.com/lists/oss-security/2022/02/23/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-24407">https://access.redhat.com/security/cve/CVE-2022-24407</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407</a><br><a href="https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst">https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst</a><br><a href="https://linux.oracle.com/cve/CVE-2022-24407.html">https://linux.oracle.com/cve/CVE-2022-24407.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9239.html">https://linux.oracle.com/errata/ELSA-2022-9239.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">https://nvd.nist.gov/vuln/detail/CVE-2022-24407</a><br><a href="https://ubuntu.com/security/notices/USN-5301-1">https://ubuntu.com/security/notices/USN-5301-1</a><br><a href="https://ubuntu.com/security/notices/USN-5301-2">https://ubuntu.com/security/notices/USN-5301-2</a><br><a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28</a><br><a href="https://www.debian.org/security/2022/dsa-5087">https://www.debian.org/security/2022/dsa-5087</a><br></details> |
| libsasl2-modules-db | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3+deb9u1 | 2.1.27~101-g0780600+dfsg-3+deb9u2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/23/4">http://www.openwall.com/lists/oss-security/2022/02/23/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-24407">https://access.redhat.com/security/cve/CVE-2022-24407</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407</a><br><a href="https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst">https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst</a><br><a href="https://linux.oracle.com/cve/CVE-2022-24407.html">https://linux.oracle.com/cve/CVE-2022-24407.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9239.html">https://linux.oracle.com/errata/ELSA-2022-9239.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">https://nvd.nist.gov/vuln/detail/CVE-2022-24407</a><br><a href="https://ubuntu.com/security/notices/USN-5301-1">https://ubuntu.com/security/notices/USN-5301-1</a><br><a href="https://ubuntu.com/security/notices/USN-5301-2">https://ubuntu.com/security/notices/USN-5301-2</a><br><a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28</a><br><a href="https://www.debian.org/security/2022/dsa-5087">https://www.debian.org/security/2022/dsa-5087</a><br></details> |
| libsepol1 | CVE-2021-36084 | LOW | 2.6-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36084">https://access.redhat.com/security/cve/CVE-2021-36084</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084</a><br><a href="https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3">https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36084.html">https://linux.oracle.com/cve/CVE-2021-36084.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36085 | LOW | 2.6-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36085">https://access.redhat.com/security/cve/CVE-2021-36085</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085</a><br><a href="https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba">https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36085.html">https://linux.oracle.com/cve/CVE-2021-36085.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36086 | LOW | 2.6-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36086">https://access.redhat.com/security/cve/CVE-2021-36086</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36086.html">https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36087 | LOW | 2.6-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36087">https://access.redhat.com/security/cve/CVE-2021-36087</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href="https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521">https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36087.html">https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br></details> |
| libsmartcols1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| libsmartcols1 | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libsqlite3-0 | CVE-2019-8457 | CRITICAL | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8457">https://access.redhat.com/security/cve/CVE-2019-8457</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://linux.oracle.com/cve/CVE-2019-8457.html">https://linux.oracle.com/cve/CVE-2019-8457.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/</a><br><a href="https://security.netapp.com/advisory/ntap-20190606-0002/">https://security.netapp.com/advisory/ntap-20190606-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4004-1">https://ubuntu.com/security/notices/USN-4004-1</a><br><a href="https://ubuntu.com/security/notices/USN-4004-2">https://ubuntu.com/security/notices/USN-4004-2</a><br><a href="https://ubuntu.com/security/notices/USN-4019-1">https://ubuntu.com/security/notices/USN-4019-1</a><br><a href="https://ubuntu.com/security/notices/USN-4019-2">https://ubuntu.com/security/notices/USN-4019-2</a><br><a href="https://usn.ubuntu.com/4004-1/">https://usn.ubuntu.com/4004-1/</a><br><a href="https://usn.ubuntu.com/4004-2/">https://usn.ubuntu.com/4004-2/</a><br><a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a><br><a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a><br><a href="https://www.sqlite.org/releaselog/3_28_0.html">https://www.sqlite.org/releaselog/3_28_0.html</a><br><a href="https://www.sqlite.org/src/info/90acdbfce9c08858">https://www.sqlite.org/src/info/90acdbfce9c08858</a><br></details> |
| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45346">https://access.redhat.com/security/cve/CVE-2021-45346</a><br><a href="https://github.com/guyinatuxedo/sqlite3_record_leaking">https://github.com/guyinatuxedo/sqlite3_record_leaking</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0001/">https://security.netapp.com/advisory/ntap-20220303-0001/</a><br><a href="https://sqlite.org/forum/forumpost/53de8864ba114bf6">https://sqlite.org/forum/forumpost/53de8864ba114bf6</a><br></details> |
| libsqlite3-0 | CVE-2017-13685 | LOW | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html">http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html</a><br><a href="http://www.securityfocus.com/bid/100521">http://www.securityfocus.com/bid/100521</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13685">https://access.redhat.com/security/cve/CVE-2017-13685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685</a><br><a href="https://ubuntu.com/security/notices/USN-4019-1">https://ubuntu.com/security/notices/USN-4019-1</a><br><a href="https://ubuntu.com/security/notices/USN-4019-2">https://ubuntu.com/security/notices/USN-4019-2</a><br><a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a><br><a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a><br></details> |
| libsqlite3-0 | CVE-2020-11656 | LOW | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11656">https://access.redhat.com/security/cve/CVE-2020-11656</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.sqlite.org/src/info/d09f8c3621d5f7f8">https://www.sqlite.org/src/info/d09f8c3621d5f7f8</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br><a href="https://www3.sqlite.org/cgi/src/info/b64674919f673602">https://www3.sqlite.org/cgi/src/info/b64674919f673602</a><br></details> |
| libsqlite3-dev | CVE-2019-8457 | CRITICAL | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8457">https://access.redhat.com/security/cve/CVE-2019-8457</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://linux.oracle.com/cve/CVE-2019-8457.html">https://linux.oracle.com/cve/CVE-2019-8457.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/</a><br><a href="https://security.netapp.com/advisory/ntap-20190606-0002/">https://security.netapp.com/advisory/ntap-20190606-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4004-1">https://ubuntu.com/security/notices/USN-4004-1</a><br><a href="https://ubuntu.com/security/notices/USN-4004-2">https://ubuntu.com/security/notices/USN-4004-2</a><br><a href="https://ubuntu.com/security/notices/USN-4019-1">https://ubuntu.com/security/notices/USN-4019-1</a><br><a href="https://ubuntu.com/security/notices/USN-4019-2">https://ubuntu.com/security/notices/USN-4019-2</a><br><a href="https://usn.ubuntu.com/4004-1/">https://usn.ubuntu.com/4004-1/</a><br><a href="https://usn.ubuntu.com/4004-2/">https://usn.ubuntu.com/4004-2/</a><br><a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a><br><a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a><br><a href="https://www.sqlite.org/releaselog/3_28_0.html">https://www.sqlite.org/releaselog/3_28_0.html</a><br><a href="https://www.sqlite.org/src/info/90acdbfce9c08858">https://www.sqlite.org/src/info/90acdbfce9c08858</a><br></details> |
| libsqlite3-dev | CVE-2021-45346 | MEDIUM | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45346">https://access.redhat.com/security/cve/CVE-2021-45346</a><br><a href="https://github.com/guyinatuxedo/sqlite3_record_leaking">https://github.com/guyinatuxedo/sqlite3_record_leaking</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0001/">https://security.netapp.com/advisory/ntap-20220303-0001/</a><br><a href="https://sqlite.org/forum/forumpost/53de8864ba114bf6">https://sqlite.org/forum/forumpost/53de8864ba114bf6</a><br></details> |
| libsqlite3-dev | CVE-2017-13685 | LOW | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html">http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html</a><br><a href="http://www.securityfocus.com/bid/100521">http://www.securityfocus.com/bid/100521</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13685">https://access.redhat.com/security/cve/CVE-2017-13685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685</a><br><a href="https://ubuntu.com/security/notices/USN-4019-1">https://ubuntu.com/security/notices/USN-4019-1</a><br><a href="https://ubuntu.com/security/notices/USN-4019-2">https://ubuntu.com/security/notices/USN-4019-2</a><br><a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a><br><a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a><br></details> |
| libsqlite3-dev | CVE-2020-11656 | LOW | 3.16.2-5+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11656">https://access.redhat.com/security/cve/CVE-2020-11656</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.sqlite.org/src/info/d09f8c3621d5f7f8">https://www.sqlite.org/src/info/d09f8c3621d5f7f8</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br><a href="https://www3.sqlite.org/cgi/src/info/b64674919f673602">https://www3.sqlite.org/cgi/src/info/b64674919f673602</a><br></details> |
| libssh2-1 | CVE-2019-13115 | HIGH | 1.7.0-1+deb9u1 | 1.7.0-1+deb9u2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-13115">https://access.redhat.com/security/cve/CVE-2019-13115</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow/">https://blog.semmle.com/libssh2-integer-overflow/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115</a><br><a href="https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa">https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa</a><br><a href="https://github.com/libssh2/libssh2/pull/350">https://github.com/libssh2/libssh2/pull/350</a><br><a href="https://libssh2.org/changes.html">https://libssh2.org/changes.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0002/">https://security.netapp.com/advisory/ntap-20190806-0002/</a><br><a href="https://support.f5.com/csp/article/K13322484">https://support.f5.com/csp/article/K13322484</a><br><a href="https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libssh2-1 | CVE-2019-17498 | HIGH | 1.7.0-1+deb9u1 | 1.7.0-1+deb9u2 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17498">https://access.redhat.com/security/cve/CVE-2019-17498</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/">https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498</a><br><a href="https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498">https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498</a><br><a href="https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480">https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480</a><br><a href="https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c">https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c</a><br><a href="https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94">https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17498.html">https://linux.oracle.com/cve/CVE-2019-17498.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3915.html">https://linux.oracle.com/errata/ELSA-2020-3915.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">https://nvd.nist.gov/vuln/detail/CVE-2019-17498</a><br></details> |
| libssl-dev | CVE-2021-23840 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl-dev | CVE-2021-3712 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
| libssl-dev | CVE-2022-0778 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9249.html">https://linux.oracle.com/errata/ELSA-2022-9249.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br></details> |
| libssl-dev | CVE-2019-1551 | MEDIUM | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html</a><br><a href="http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html">http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1551">https://access.redhat.com/security/cve/CVE-2019-1551</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98</a><br><a href="https://github.com/openssl/openssl/pull/10575">https://github.com/openssl/openssl/pull/10575</a><br><a href="https://linux.oracle.com/cve/CVE-2019-1551.html">https://linux.oracle.com/cve/CVE-2019-1551.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4514.html">https://linux.oracle.com/errata/ELSA-2020-4514.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/</a><br><a href="https://seclists.org/bugtraq/2019/Dec/39">https://seclists.org/bugtraq/2019/Dec/39</a><br><a href="https://seclists.org/bugtraq/2019/Dec/46">https://seclists.org/bugtraq/2019/Dec/46</a><br><a href="https://security.gentoo.org/glsa/202004-10">https://security.gentoo.org/glsa/202004-10</a><br><a href="https://security.netapp.com/advisory/ntap-20191210-0001/">https://security.netapp.com/advisory/ntap-20191210-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4376-1">https://ubuntu.com/security/notices/USN-4376-1</a><br><a href="https://ubuntu.com/security/notices/USN-4504-1">https://ubuntu.com/security/notices/USN-4504-1</a><br><a href="https://usn.ubuntu.com/4376-1/">https://usn.ubuntu.com/4376-1/</a><br><a href="https://usn.ubuntu.com/4504-1/">https://usn.ubuntu.com/4504-1/</a><br><a href="https://www.debian.org/security/2019/dsa-4594">https://www.debian.org/security/2019/dsa-4594</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20191206.txt">https://www.openssl.org/news/secadv/20191206.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.tenable.com/security/tns-2019-09">https://www.tenable.com/security/tns-2019-09</a><br><a href="https://www.tenable.com/security/tns-2020-03">https://www.tenable.com/security/tns-2020-03</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl-dev | CVE-2021-23841 | MEDIUM | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u3 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libssl-dev | CVE-2021-4160 | MEDIUM | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4160">https://access.redhat.com/security/cve/CVE-2021-4160</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4160">https://nvd.nist.gov/vuln/detail/CVE-2021-4160</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220128.txt">https://www.openssl.org/news/secadv/20220128.txt</a><br></details> |
| libssl-dev | CVE-2007-6755 | LOW | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl-dev | CVE-2010-0928 | LOW | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libssl1.0.2 | CVE-2021-23840 | HIGH | 1.0.2u-1~deb9u3 | 1.0.2u-1~deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.0.2 | CVE-2021-3712 | HIGH | 1.0.2u-1~deb9u3 | 1.0.2u-1~deb9u6 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
| libssl1.0.2 | CVE-2022-0778 | HIGH | 1.0.2u-1~deb9u3 | 1.0.2u-1~deb9u7 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9249.html">https://linux.oracle.com/errata/ELSA-2022-9249.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br></details> |
| libssl1.0.2 | CVE-2021-23841 | MEDIUM | 1.0.2u-1~deb9u3 | 1.0.2u-1~deb9u4 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libssl1.0.2 | CVE-2021-3601 | LOW | 1.0.2u-1~deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3601">https://access.redhat.com/security/cve/CVE-2021-3601</a><br></details> |
| libssl1.0.2 | DLA-2761-1 | UNKNOWN | 1.0.2u-1~deb9u3 | 1.0.2u-1~deb9u5 | <details><summary>Expand...</summary></details> |
| libssl1.1 | CVE-2021-23840 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9249.html">https://linux.oracle.com/errata/ELSA-2022-9249.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br></details> |
| libssl1.1 | CVE-2019-1551 | MEDIUM | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html</a><br><a href="http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html">http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1551">https://access.redhat.com/security/cve/CVE-2019-1551</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98</a><br><a href="https://github.com/openssl/openssl/pull/10575">https://github.com/openssl/openssl/pull/10575</a><br><a href="https://linux.oracle.com/cve/CVE-2019-1551.html">https://linux.oracle.com/cve/CVE-2019-1551.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4514.html">https://linux.oracle.com/errata/ELSA-2020-4514.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/</a><br><a href="https://seclists.org/bugtraq/2019/Dec/39">https://seclists.org/bugtraq/2019/Dec/39</a><br><a href="https://seclists.org/bugtraq/2019/Dec/46">https://seclists.org/bugtraq/2019/Dec/46</a><br><a href="https://security.gentoo.org/glsa/202004-10">https://security.gentoo.org/glsa/202004-10</a><br><a href="https://security.netapp.com/advisory/ntap-20191210-0001/">https://security.netapp.com/advisory/ntap-20191210-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4376-1">https://ubuntu.com/security/notices/USN-4376-1</a><br><a href="https://ubuntu.com/security/notices/USN-4504-1">https://ubuntu.com/security/notices/USN-4504-1</a><br><a href="https://usn.ubuntu.com/4376-1/">https://usn.ubuntu.com/4376-1/</a><br><a href="https://usn.ubuntu.com/4504-1/">https://usn.ubuntu.com/4504-1/</a><br><a href="https://www.debian.org/security/2019/dsa-4594">https://www.debian.org/security/2019/dsa-4594</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20191206.txt">https://www.openssl.org/news/secadv/20191206.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.tenable.com/security/tns-2019-09">https://www.tenable.com/security/tns-2019-09</a><br><a href="https://www.tenable.com/security/tns-2020-03">https://www.tenable.com/security/tns-2020-03</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.1 | CVE-2021-23841 | MEDIUM | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u3 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4160">https://access.redhat.com/security/cve/CVE-2021-4160</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4160">https://nvd.nist.gov/vuln/detail/CVE-2021-4160</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220128.txt">https://www.openssl.org/news/secadv/20220128.txt</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libstdc++-6-dev | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libstdc++6 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libsvn1 | CVE-2020-17525 | HIGH | 1.9.5-1+deb9u5 | 1.9.5-1+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-17525">https://access.redhat.com/security/cve/CVE-2020-17525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525</a><br><a href="https://linux.oracle.com/cve/CVE-2020-17525.html">https://linux.oracle.com/cve/CVE-2020-17525.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0507.html">https://linux.oracle.com/errata/ELSA-2021-0507.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17525">https://nvd.nist.gov/vuln/detail/CVE-2020-17525</a><br><a href="https://subversion.apache.org/security/CVE-2020-17525-advisory.txt">https://subversion.apache.org/security/CVE-2020-17525-advisory.txt</a><br><a href="https://ubuntu.com/security/notices/USN-5322-1">https://ubuntu.com/security/notices/USN-5322-1</a><br></details> |
| libsystemd0 | CVE-2019-3843 | HIGH | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2019-3844 | HIGH | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2020-1712 | HIGH | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1712">https://access.redhat.com/security/cve/CVE-2020-1712</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712</a><br><a href="https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54">https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54</a><br><a href="https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb">https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb</a><br><a href="https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d">https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d</a><br><a href="https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2">https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1712.html">https://linux.oracle.com/cve/CVE-2020-1712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-0575.html">https://linux.oracle.com/errata/ELSA-2020-0575.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">https://nvd.nist.gov/vuln/detail/CVE-2020-1712</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/02/05/1">https://www.openwall.com/lists/oss-security/2020/02/05/1</a><br></details> |
| libsystemd0 | CVE-2021-33910 | MEDIUM | 232-25+deb9u12 | 232-25+deb9u13 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html">http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33910">https://access.redhat.com/security/cve/CVE-2021-33910</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href="https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b">https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href="https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce">https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href="https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538">https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href="https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61">https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href="https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b">https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href="https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9">https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33910.html">https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2717.html">https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">https://nvd.nist.gov/vuln/detail/CVE-2021-33910</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0008/">https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br><a href="https://www.debian.org/security/2021/dsa-4942">https://www.debian.org/security/2021/dsa-4942</a><br><a href="https://www.openwall.com/lists/oss-security/2021/07/20/2">https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href="https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt">https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details> |
| libsystemd0 | CVE-2021-3997 | MEDIUM | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libsystemd0 | CVE-2013-4392 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libsystemd0 | CVE-2017-1000082 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/07/02/1">http://www.openwall.com/lists/oss-security/2017/07/02/1</a><br><a href="http://www.securityfocus.com/bid/99507">http://www.securityfocus.com/bid/99507</a><br><a href="http://www.securitytracker.com/id/1038839">http://www.securitytracker.com/id/1038839</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-1000082">https://access.redhat.com/security/cve/CVE-2017-1000082</a><br><a href="https://github.com/systemd/systemd/issues/6237">https://github.com/systemd/systemd/issues/6237</a><br></details> |
| libsystemd0 | CVE-2017-18078 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html">http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html</a><br><a href="http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html">http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/29/3">http://www.openwall.com/lists/oss-security/2018/01/29/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18078">https://access.redhat.com/security/cve/CVE-2017-18078</a><br><a href="https://github.com/systemd/systemd/issues/7736">https://github.com/systemd/systemd/issues/7736</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html">https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html</a><br><a href="https://www.exploit-db.com/exploits/43935/">https://www.exploit-db.com/exploits/43935/</a><br><a href="https://www.openwall.com/lists/oss-security/2018/01/29/4">https://www.openwall.com/lists/oss-security/2018/01/29/4</a><br></details> |
| libsystemd0 | CVE-2018-16888 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/errata/RHSA-2019:2091">https://access.redhat.com/errata/RHSA-2019:2091</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16888">https://access.redhat.com/security/cve/CVE-2018-16888</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16888.html">https://linux.oracle.com/cve/CVE-2018-16888.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2091.html">https://linux.oracle.com/errata/ELSA-2019-2091.html</a><br><a href="https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E">https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190307-0007/">https://security.netapp.com/advisory/ntap-20190307-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2018-6954 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6954">https://access.redhat.com/security/cve/CVE-2018-6954</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954</a><br><a href="https://github.com/systemd/systemd/issues/7986">https://github.com/systemd/systemd/issues/7986</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-3816-1">https://ubuntu.com/security/notices/USN-3816-1</a><br><a href="https://ubuntu.com/security/notices/USN-3816-2">https://ubuntu.com/security/notices/USN-3816-2</a><br><a href="https://usn.ubuntu.com/3816-1/">https://usn.ubuntu.com/3816-1/</a><br><a href="https://usn.ubuntu.com/3816-2/">https://usn.ubuntu.com/3816-2/</a><br></details> |
| libsystemd0 | CVE-2019-20386 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2020-13529 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libsystemd0 | CVE-2020-13776 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.10-1.1+deb9u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000654">https://access.redhat.com/security/cve/CVE-2018-1000654</a><br><a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libtiff5 | CVE-2020-19131 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u7 | <details><summary>Expand...</summary><a href="http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/">http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/</a><br><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2831">http://bugzilla.maptools.org/show_bug.cgi?id=2831</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-19131">https://access.redhat.com/security/cve/CVE-2020-19131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html</a><br></details> |
| libtiff5 | CVE-2020-35523 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35523">https://access.redhat.com/security/cve/CVE-2020-35523</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932040">https://bugzilla.redhat.com/show_bug.cgi?id=1932040</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2">https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/160">https://gitlab.com/libtiff/libtiff/-/merge_requests/160</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35523.html">https://linux.oracle.com/cve/CVE-2020-35523.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">https://nvd.nist.gov/vuln/detail/CVE-2020-35523</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4755-1">https://ubuntu.com/security/notices/USN-4755-1</a><br><a href="https://www.debian.org/security/2021/dsa-4869">https://www.debian.org/security/2021/dsa-4869</a><br></details> |
| libtiff5 | CVE-2020-35524 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35524">https://access.redhat.com/security/cve/CVE-2020-35524</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932044">https://bugzilla.redhat.com/show_bug.cgi?id=1932044</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/159">https://gitlab.com/libtiff/libtiff/-/merge_requests/159</a><br><a href="https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22">https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35524.html">https://linux.oracle.com/cve/CVE-2020-35524.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">https://nvd.nist.gov/vuln/detail/CVE-2020-35524</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4755-1">https://ubuntu.com/security/notices/USN-4755-1</a><br><a href="https://www.debian.org/security/2021/dsa-4869">https://www.debian.org/security/2021/dsa-4869</a><br></details> |
| libtiff5 | CVE-2022-0891 | HIGH | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0891">https://access.redhat.com/security/cve/CVE-2022-0891</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891</a><br><a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/380">https://gitlab.com/libtiff/libtiff/-/issues/380</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/382">https://gitlab.com/libtiff/libtiff/-/issues/382</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">https://nvd.nist.gov/vuln/detail/CVE-2022-0891</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2020-19144 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u7 | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2852">http://bugzilla.maptools.org/show_bug.cgi?id=2852</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-19144">https://access.redhat.com/security/cve/CVE-2020-19144</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/159">https://gitlab.com/libtiff/libtiff/-/issues/159</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211004-0005/">https://security.netapp.com/advisory/ntap-20211004-0005/</a><br></details> |
| libtiff5 | CVE-2022-0561 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0561">https://access.redhat.com/security/cve/CVE-2022-0561</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561</a><br><a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/362">https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">https://nvd.nist.gov/vuln/detail/CVE-2022-0561</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0001/">https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-0562 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0562">https://access.redhat.com/security/cve/CVE-2022-0562</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562</a><br><a href="https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b">https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/362">https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">https://nvd.nist.gov/vuln/detail/CVE-2022-0562</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0001/">https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-0865 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0865">https://access.redhat.com/security/cve/CVE-2022-0865</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067">https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/385">https://gitlab.com/libtiff/libtiff/-/issues/385</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/306">https://gitlab.com/libtiff/libtiff/-/merge_requests/306</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">https://nvd.nist.gov/vuln/detail/CVE-2022-0865</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-0907 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0907">https://access.redhat.com/security/cve/CVE-2022-0907</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/392">https://gitlab.com/libtiff/libtiff/-/issues/392</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/314">https://gitlab.com/libtiff/libtiff/-/merge_requests/314</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0907">https://nvd.nist.gov/vuln/detail/CVE-2022-0907</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-0908 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0908">https://access.redhat.com/security/cve/CVE-2022-0908</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85">https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/383">https://gitlab.com/libtiff/libtiff/-/issues/383</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">https://nvd.nist.gov/vuln/detail/CVE-2022-0908</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-0909 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0909">https://access.redhat.com/security/cve/CVE-2022-0909</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/393">https://gitlab.com/libtiff/libtiff/-/issues/393</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/310">https://gitlab.com/libtiff/libtiff/-/merge_requests/310</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">https://nvd.nist.gov/vuln/detail/CVE-2022-0909</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-0924 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0924">https://access.redhat.com/security/cve/CVE-2022-0924</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/278">https://gitlab.com/libtiff/libtiff/-/issues/278</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/311">https://gitlab.com/libtiff/libtiff/-/merge_requests/311</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">https://nvd.nist.gov/vuln/detail/CVE-2022-0924</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2022-22844 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22844">https://access.redhat.com/security/cve/CVE-2022-22844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/355">https://gitlab.com/libtiff/libtiff/-/issues/355</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/287">https://gitlab.com/libtiff/libtiff/-/merge_requests/287</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">https://nvd.nist.gov/vuln/detail/CVE-2022-22844</a><br><a href="https://security.netapp.com/advisory/ntap-20220311-0002/">https://security.netapp.com/advisory/ntap-20220311-0002/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5 | CVE-2014-8130 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2483">http://bugzilla.maptools.org/show_bug.cgi?id=2483</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html">http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html</a><br><a href="http://openwall.com/lists/oss-security/2015/01/24/15">http://openwall.com/lists/oss-security/2015/01/24/15</a><br><a href="http://rhn.redhat.com/errata/RHSA-2016-1546.html">http://rhn.redhat.com/errata/RHSA-2016-1546.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2016-1547.html">http://rhn.redhat.com/errata/RHSA-2016-1547.html</a><br><a href="http://support.apple.com/kb/HT204941">http://support.apple.com/kb/HT204941</a><br><a href="http://support.apple.com/kb/HT204942">http://support.apple.com/kb/HT204942</a><br><a href="http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt">http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt</a><br><a href="http://www.securityfocus.com/bid/72353">http://www.securityfocus.com/bid/72353</a><br><a href="http://www.securitytracker.com/id/1032760">http://www.securitytracker.com/id/1032760</a><br><a href="https://access.redhat.com/security/cve/CVE-2014-8130">https://access.redhat.com/security/cve/CVE-2014-8130</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1185817">https://bugzilla.redhat.com/show_bug.cgi?id=1185817</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130</a><br><a href="https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543">https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543</a><br><a href="https://linux.oracle.com/cve/CVE-2014-8130.html">https://linux.oracle.com/cve/CVE-2014-8130.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2016-1547.html">https://linux.oracle.com/errata/ELSA-2016-1547.html</a><br><a href="https://security.gentoo.org/glsa/201701-16">https://security.gentoo.org/glsa/201701-16</a><br><a href="https://ubuntu.com/security/notices/USN-2553-1">https://ubuntu.com/security/notices/USN-2553-1</a><br></details> |
| libtiff5 | CVE-2017-16232 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html</a><br><a href="http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html">http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/32">http://seclists.org/fulldisclosure/2018/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/47">http://seclists.org/fulldisclosure/2018/Dec/47</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101696">http://www.securityfocus.com/bid/101696</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16232">https://access.redhat.com/security/cve/CVE-2017-16232</a><br></details> |
| libtiff5 | CVE-2017-17973 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2769">http://bugzilla.maptools.org/show_bug.cgi?id=2769</a><br><a href="http://www.securityfocus.com/bid/102331">http://www.securityfocus.com/bid/102331</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17973">https://access.redhat.com/security/cve/CVE-2017-17973</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=1074318">https://bugzilla.novell.com/show_bug.cgi?id=1074318</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1530912">https://bugzilla.redhat.com/show_bug.cgi?id=1530912</a><br></details> |
| libtiff5 | CVE-2017-5563 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2664">http://bugzilla.maptools.org/show_bug.cgi?id=2664</a><br><a href="http://www.securityfocus.com/bid/95705">http://www.securityfocus.com/bid/95705</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5563">https://access.redhat.com/security/cve/CVE-2017-5563</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563</a><br><a href="https://security.gentoo.org/glsa/201709-27">https://security.gentoo.org/glsa/201709-27</a><br><a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a><br><a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a><br></details> |
| libtiff5 | CVE-2017-9117 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2690">http://bugzilla.maptools.org/show_bug.cgi?id=2690</a><br><a href="http://www.securityfocus.com/bid/98581">http://www.securityfocus.com/bid/98581</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9117">https://access.redhat.com/security/cve/CVE-2017-9117</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117</a><br><a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a><br><a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a><br></details> |
| libtiff5 | CVE-2018-10126 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10126">https://access.redhat.com/security/cve/CVE-2018-10126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libtiff5 | CVE-2018-18661 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2819">http://bugzilla.maptools.org/show_bug.cgi?id=2819</a><br><a href="http://www.securityfocus.com/bid/105762">http://www.securityfocus.com/bid/105762</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2053">https://access.redhat.com/errata/RHSA-2019:2053</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18661">https://access.redhat.com/security/cve/CVE-2018-18661</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18661.html">https://linux.oracle.com/cve/CVE-2018-18661.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2053.html">https://linux.oracle.com/errata/ELSA-2019-2053.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html</a><br><a href="https://ubuntu.com/security/notices/USN-3864-1">https://ubuntu.com/security/notices/USN-3864-1</a><br><a href="https://usn.ubuntu.com/3864-1/">https://usn.ubuntu.com/3864-1/</a><br></details> |
| libtiff5 | CVE-2019-6128 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2836">http://bugzilla.maptools.org/show_bug.cgi?id=2836</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html</a><br><a href="http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html">http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6128">https://access.redhat.com/security/cve/CVE-2019-6128</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128</a><br><a href="https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8">https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html</a><br><a href="https://seclists.org/bugtraq/2019/Nov/5">https://seclists.org/bugtraq/2019/Nov/5</a><br><a href="https://security.gentoo.org/glsa/202003-25">https://security.gentoo.org/glsa/202003-25</a><br><a href="https://ubuntu.com/security/notices/USN-3906-1">https://ubuntu.com/security/notices/USN-3906-1</a><br><a href="https://ubuntu.com/security/notices/USN-3906-2">https://ubuntu.com/security/notices/USN-3906-2</a><br><a href="https://usn.ubuntu.com/3906-1/">https://usn.ubuntu.com/3906-1/</a><br><a href="https://usn.ubuntu.com/3906-2/">https://usn.ubuntu.com/3906-2/</a><br></details> |
| libtiff5 | CVE-2020-35521 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35521">https://access.redhat.com/security/cve/CVE-2020-35521</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932034">https://bugzilla.redhat.com/show_bug.cgi?id=1932034</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35521.html">https://linux.oracle.com/cve/CVE-2020-35521.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">https://nvd.nist.gov/vuln/detail/CVE-2020-35521</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details> |
| libtiff5 | CVE-2020-35522 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35522">https://access.redhat.com/security/cve/CVE-2020-35522</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932037">https://bugzilla.redhat.com/show_bug.cgi?id=1932037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/165">https://gitlab.com/libtiff/libtiff/-/merge_requests/165</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35522.html">https://linux.oracle.com/cve/CVE-2020-35522.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">https://nvd.nist.gov/vuln/detail/CVE-2020-35522</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details> |
| libtiff5 | CVE-2022-1056 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/391">https://gitlab.com/libtiff/libtiff/-/issues/391</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/307">https://gitlab.com/libtiff/libtiff/-/merge_requests/307</a><br></details> |
| libtiff5-dev | CVE-2020-19131 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u7 | <details><summary>Expand...</summary><a href="http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/">http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/</a><br><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2831">http://bugzilla.maptools.org/show_bug.cgi?id=2831</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-19131">https://access.redhat.com/security/cve/CVE-2020-19131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html</a><br></details> |
| libtiff5-dev | CVE-2020-35523 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35523">https://access.redhat.com/security/cve/CVE-2020-35523</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932040">https://bugzilla.redhat.com/show_bug.cgi?id=1932040</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2">https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/160">https://gitlab.com/libtiff/libtiff/-/merge_requests/160</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35523.html">https://linux.oracle.com/cve/CVE-2020-35523.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">https://nvd.nist.gov/vuln/detail/CVE-2020-35523</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4755-1">https://ubuntu.com/security/notices/USN-4755-1</a><br><a href="https://www.debian.org/security/2021/dsa-4869">https://www.debian.org/security/2021/dsa-4869</a><br></details> |
| libtiff5-dev | CVE-2020-35524 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35524">https://access.redhat.com/security/cve/CVE-2020-35524</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932044">https://bugzilla.redhat.com/show_bug.cgi?id=1932044</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/159">https://gitlab.com/libtiff/libtiff/-/merge_requests/159</a><br><a href="https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22">https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35524.html">https://linux.oracle.com/cve/CVE-2020-35524.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">https://nvd.nist.gov/vuln/detail/CVE-2020-35524</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4755-1">https://ubuntu.com/security/notices/USN-4755-1</a><br><a href="https://www.debian.org/security/2021/dsa-4869">https://www.debian.org/security/2021/dsa-4869</a><br></details> |
| libtiff5-dev | CVE-2022-0891 | HIGH | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0891">https://access.redhat.com/security/cve/CVE-2022-0891</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891</a><br><a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/380">https://gitlab.com/libtiff/libtiff/-/issues/380</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/382">https://gitlab.com/libtiff/libtiff/-/issues/382</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">https://nvd.nist.gov/vuln/detail/CVE-2022-0891</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2020-19144 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u7 | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2852">http://bugzilla.maptools.org/show_bug.cgi?id=2852</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-19144">https://access.redhat.com/security/cve/CVE-2020-19144</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/159">https://gitlab.com/libtiff/libtiff/-/issues/159</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211004-0005/">https://security.netapp.com/advisory/ntap-20211004-0005/</a><br></details> |
| libtiff5-dev | CVE-2022-0561 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0561">https://access.redhat.com/security/cve/CVE-2022-0561</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561</a><br><a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/362">https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">https://nvd.nist.gov/vuln/detail/CVE-2022-0561</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0001/">https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-0562 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0562">https://access.redhat.com/security/cve/CVE-2022-0562</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562</a><br><a href="https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b">https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/362">https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">https://nvd.nist.gov/vuln/detail/CVE-2022-0562</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0001/">https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-0865 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0865">https://access.redhat.com/security/cve/CVE-2022-0865</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067">https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/385">https://gitlab.com/libtiff/libtiff/-/issues/385</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/306">https://gitlab.com/libtiff/libtiff/-/merge_requests/306</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">https://nvd.nist.gov/vuln/detail/CVE-2022-0865</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-0907 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0907">https://access.redhat.com/security/cve/CVE-2022-0907</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/392">https://gitlab.com/libtiff/libtiff/-/issues/392</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/314">https://gitlab.com/libtiff/libtiff/-/merge_requests/314</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0907">https://nvd.nist.gov/vuln/detail/CVE-2022-0907</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-0908 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0908">https://access.redhat.com/security/cve/CVE-2022-0908</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85">https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/383">https://gitlab.com/libtiff/libtiff/-/issues/383</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">https://nvd.nist.gov/vuln/detail/CVE-2022-0908</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-0909 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0909">https://access.redhat.com/security/cve/CVE-2022-0909</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/393">https://gitlab.com/libtiff/libtiff/-/issues/393</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/310">https://gitlab.com/libtiff/libtiff/-/merge_requests/310</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">https://nvd.nist.gov/vuln/detail/CVE-2022-0909</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-0924 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0924">https://access.redhat.com/security/cve/CVE-2022-0924</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/278">https://gitlab.com/libtiff/libtiff/-/issues/278</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/311">https://gitlab.com/libtiff/libtiff/-/merge_requests/311</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">https://nvd.nist.gov/vuln/detail/CVE-2022-0924</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2022-22844 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22844">https://access.redhat.com/security/cve/CVE-2022-22844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/355">https://gitlab.com/libtiff/libtiff/-/issues/355</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/287">https://gitlab.com/libtiff/libtiff/-/merge_requests/287</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">https://nvd.nist.gov/vuln/detail/CVE-2022-22844</a><br><a href="https://security.netapp.com/advisory/ntap-20220311-0002/">https://security.netapp.com/advisory/ntap-20220311-0002/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiff5-dev | CVE-2014-8130 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2483">http://bugzilla.maptools.org/show_bug.cgi?id=2483</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html">http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html</a><br><a href="http://openwall.com/lists/oss-security/2015/01/24/15">http://openwall.com/lists/oss-security/2015/01/24/15</a><br><a href="http://rhn.redhat.com/errata/RHSA-2016-1546.html">http://rhn.redhat.com/errata/RHSA-2016-1546.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2016-1547.html">http://rhn.redhat.com/errata/RHSA-2016-1547.html</a><br><a href="http://support.apple.com/kb/HT204941">http://support.apple.com/kb/HT204941</a><br><a href="http://support.apple.com/kb/HT204942">http://support.apple.com/kb/HT204942</a><br><a href="http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt">http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt</a><br><a href="http://www.securityfocus.com/bid/72353">http://www.securityfocus.com/bid/72353</a><br><a href="http://www.securitytracker.com/id/1032760">http://www.securitytracker.com/id/1032760</a><br><a href="https://access.redhat.com/security/cve/CVE-2014-8130">https://access.redhat.com/security/cve/CVE-2014-8130</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1185817">https://bugzilla.redhat.com/show_bug.cgi?id=1185817</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130</a><br><a href="https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543">https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543</a><br><a href="https://linux.oracle.com/cve/CVE-2014-8130.html">https://linux.oracle.com/cve/CVE-2014-8130.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2016-1547.html">https://linux.oracle.com/errata/ELSA-2016-1547.html</a><br><a href="https://security.gentoo.org/glsa/201701-16">https://security.gentoo.org/glsa/201701-16</a><br><a href="https://ubuntu.com/security/notices/USN-2553-1">https://ubuntu.com/security/notices/USN-2553-1</a><br></details> |
| libtiff5-dev | CVE-2017-16232 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html</a><br><a href="http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html">http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/32">http://seclists.org/fulldisclosure/2018/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/47">http://seclists.org/fulldisclosure/2018/Dec/47</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101696">http://www.securityfocus.com/bid/101696</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16232">https://access.redhat.com/security/cve/CVE-2017-16232</a><br></details> |
| libtiff5-dev | CVE-2017-17973 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2769">http://bugzilla.maptools.org/show_bug.cgi?id=2769</a><br><a href="http://www.securityfocus.com/bid/102331">http://www.securityfocus.com/bid/102331</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17973">https://access.redhat.com/security/cve/CVE-2017-17973</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=1074318">https://bugzilla.novell.com/show_bug.cgi?id=1074318</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1530912">https://bugzilla.redhat.com/show_bug.cgi?id=1530912</a><br></details> |
| libtiff5-dev | CVE-2017-5563 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2664">http://bugzilla.maptools.org/show_bug.cgi?id=2664</a><br><a href="http://www.securityfocus.com/bid/95705">http://www.securityfocus.com/bid/95705</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5563">https://access.redhat.com/security/cve/CVE-2017-5563</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563</a><br><a href="https://security.gentoo.org/glsa/201709-27">https://security.gentoo.org/glsa/201709-27</a><br><a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a><br><a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a><br></details> |
| libtiff5-dev | CVE-2017-9117 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2690">http://bugzilla.maptools.org/show_bug.cgi?id=2690</a><br><a href="http://www.securityfocus.com/bid/98581">http://www.securityfocus.com/bid/98581</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9117">https://access.redhat.com/security/cve/CVE-2017-9117</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117</a><br><a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a><br><a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a><br></details> |
| libtiff5-dev | CVE-2018-10126 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10126">https://access.redhat.com/security/cve/CVE-2018-10126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libtiff5-dev | CVE-2018-18661 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2819">http://bugzilla.maptools.org/show_bug.cgi?id=2819</a><br><a href="http://www.securityfocus.com/bid/105762">http://www.securityfocus.com/bid/105762</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2053">https://access.redhat.com/errata/RHSA-2019:2053</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18661">https://access.redhat.com/security/cve/CVE-2018-18661</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18661.html">https://linux.oracle.com/cve/CVE-2018-18661.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2053.html">https://linux.oracle.com/errata/ELSA-2019-2053.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html</a><br><a href="https://ubuntu.com/security/notices/USN-3864-1">https://ubuntu.com/security/notices/USN-3864-1</a><br><a href="https://usn.ubuntu.com/3864-1/">https://usn.ubuntu.com/3864-1/</a><br></details> |
| libtiff5-dev | CVE-2019-6128 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2836">http://bugzilla.maptools.org/show_bug.cgi?id=2836</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html</a><br><a href="http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html">http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6128">https://access.redhat.com/security/cve/CVE-2019-6128</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128</a><br><a href="https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8">https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html</a><br><a href="https://seclists.org/bugtraq/2019/Nov/5">https://seclists.org/bugtraq/2019/Nov/5</a><br><a href="https://security.gentoo.org/glsa/202003-25">https://security.gentoo.org/glsa/202003-25</a><br><a href="https://ubuntu.com/security/notices/USN-3906-1">https://ubuntu.com/security/notices/USN-3906-1</a><br><a href="https://ubuntu.com/security/notices/USN-3906-2">https://ubuntu.com/security/notices/USN-3906-2</a><br><a href="https://usn.ubuntu.com/3906-1/">https://usn.ubuntu.com/3906-1/</a><br><a href="https://usn.ubuntu.com/3906-2/">https://usn.ubuntu.com/3906-2/</a><br></details> |
| libtiff5-dev | CVE-2020-35521 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35521">https://access.redhat.com/security/cve/CVE-2020-35521</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932034">https://bugzilla.redhat.com/show_bug.cgi?id=1932034</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35521.html">https://linux.oracle.com/cve/CVE-2020-35521.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">https://nvd.nist.gov/vuln/detail/CVE-2020-35521</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details> |
| libtiff5-dev | CVE-2020-35522 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35522">https://access.redhat.com/security/cve/CVE-2020-35522</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932037">https://bugzilla.redhat.com/show_bug.cgi?id=1932037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/165">https://gitlab.com/libtiff/libtiff/-/merge_requests/165</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35522.html">https://linux.oracle.com/cve/CVE-2020-35522.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">https://nvd.nist.gov/vuln/detail/CVE-2020-35522</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details> |
| libtiff5-dev | CVE-2022-1056 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/391">https://gitlab.com/libtiff/libtiff/-/issues/391</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/307">https://gitlab.com/libtiff/libtiff/-/merge_requests/307</a><br></details> |
| libtiffxx5 | CVE-2020-19131 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u7 | <details><summary>Expand...</summary><a href="http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/">http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/</a><br><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2831">http://bugzilla.maptools.org/show_bug.cgi?id=2831</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-19131">https://access.redhat.com/security/cve/CVE-2020-19131</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html</a><br></details> |
| libtiffxx5 | CVE-2020-35523 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35523">https://access.redhat.com/security/cve/CVE-2020-35523</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932040">https://bugzilla.redhat.com/show_bug.cgi?id=1932040</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2">https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/160">https://gitlab.com/libtiff/libtiff/-/merge_requests/160</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35523.html">https://linux.oracle.com/cve/CVE-2020-35523.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">https://nvd.nist.gov/vuln/detail/CVE-2020-35523</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4755-1">https://ubuntu.com/security/notices/USN-4755-1</a><br><a href="https://www.debian.org/security/2021/dsa-4869">https://www.debian.org/security/2021/dsa-4869</a><br></details> |
| libtiffxx5 | CVE-2020-35524 | HIGH | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35524">https://access.redhat.com/security/cve/CVE-2020-35524</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932044">https://bugzilla.redhat.com/show_bug.cgi?id=1932044</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/159">https://gitlab.com/libtiff/libtiff/-/merge_requests/159</a><br><a href="https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22">https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35524.html">https://linux.oracle.com/cve/CVE-2020-35524.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">https://nvd.nist.gov/vuln/detail/CVE-2020-35524</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4755-1">https://ubuntu.com/security/notices/USN-4755-1</a><br><a href="https://www.debian.org/security/2021/dsa-4869">https://www.debian.org/security/2021/dsa-4869</a><br></details> |
| libtiffxx5 | CVE-2022-0891 | HIGH | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0891">https://access.redhat.com/security/cve/CVE-2022-0891</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891</a><br><a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/380">https://gitlab.com/libtiff/libtiff/-/issues/380</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/382">https://gitlab.com/libtiff/libtiff/-/issues/382</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">https://nvd.nist.gov/vuln/detail/CVE-2022-0891</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2020-19144 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u7 | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2852">http://bugzilla.maptools.org/show_bug.cgi?id=2852</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-19144">https://access.redhat.com/security/cve/CVE-2020-19144</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/159">https://gitlab.com/libtiff/libtiff/-/issues/159</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211004-0005/">https://security.netapp.com/advisory/ntap-20211004-0005/</a><br></details> |
| libtiffxx5 | CVE-2022-0561 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0561">https://access.redhat.com/security/cve/CVE-2022-0561</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561</a><br><a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/362">https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">https://nvd.nist.gov/vuln/detail/CVE-2022-0561</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0001/">https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-0562 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0562">https://access.redhat.com/security/cve/CVE-2022-0562</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562</a><br><a href="https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b">https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/362">https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">https://nvd.nist.gov/vuln/detail/CVE-2022-0562</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0001/">https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-0865 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0865">https://access.redhat.com/security/cve/CVE-2022-0865</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067">https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/385">https://gitlab.com/libtiff/libtiff/-/issues/385</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/306">https://gitlab.com/libtiff/libtiff/-/merge_requests/306</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">https://nvd.nist.gov/vuln/detail/CVE-2022-0865</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-0907 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0907">https://access.redhat.com/security/cve/CVE-2022-0907</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/392">https://gitlab.com/libtiff/libtiff/-/issues/392</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/314">https://gitlab.com/libtiff/libtiff/-/merge_requests/314</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0907">https://nvd.nist.gov/vuln/detail/CVE-2022-0907</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-0908 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0908">https://access.redhat.com/security/cve/CVE-2022-0908</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85">https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/383">https://gitlab.com/libtiff/libtiff/-/issues/383</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">https://nvd.nist.gov/vuln/detail/CVE-2022-0908</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-0909 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0909">https://access.redhat.com/security/cve/CVE-2022-0909</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/393">https://gitlab.com/libtiff/libtiff/-/issues/393</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/310">https://gitlab.com/libtiff/libtiff/-/merge_requests/310</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">https://nvd.nist.gov/vuln/detail/CVE-2022-0909</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-0924 | MEDIUM | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0924">https://access.redhat.com/security/cve/CVE-2022-0924</a><br><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/278">https://gitlab.com/libtiff/libtiff/-/issues/278</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/311">https://gitlab.com/libtiff/libtiff/-/merge_requests/311</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">https://nvd.nist.gov/vuln/detail/CVE-2022-0924</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2022-22844 | MEDIUM | 4.0.8-2+deb9u5 | 4.0.8-2+deb9u8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22844">https://access.redhat.com/security/cve/CVE-2022-22844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/355">https://gitlab.com/libtiff/libtiff/-/issues/355</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/287">https://gitlab.com/libtiff/libtiff/-/merge_requests/287</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">https://nvd.nist.gov/vuln/detail/CVE-2022-22844</a><br><a href="https://security.netapp.com/advisory/ntap-20220311-0002/">https://security.netapp.com/advisory/ntap-20220311-0002/</a><br><a href="https://www.debian.org/security/2022/dsa-5108">https://www.debian.org/security/2022/dsa-5108</a><br></details> |
| libtiffxx5 | CVE-2014-8130 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2483">http://bugzilla.maptools.org/show_bug.cgi?id=2483</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html">http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html</a><br><a href="http://openwall.com/lists/oss-security/2015/01/24/15">http://openwall.com/lists/oss-security/2015/01/24/15</a><br><a href="http://rhn.redhat.com/errata/RHSA-2016-1546.html">http://rhn.redhat.com/errata/RHSA-2016-1546.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2016-1547.html">http://rhn.redhat.com/errata/RHSA-2016-1547.html</a><br><a href="http://support.apple.com/kb/HT204941">http://support.apple.com/kb/HT204941</a><br><a href="http://support.apple.com/kb/HT204942">http://support.apple.com/kb/HT204942</a><br><a href="http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt">http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt</a><br><a href="http://www.securityfocus.com/bid/72353">http://www.securityfocus.com/bid/72353</a><br><a href="http://www.securitytracker.com/id/1032760">http://www.securitytracker.com/id/1032760</a><br><a href="https://access.redhat.com/security/cve/CVE-2014-8130">https://access.redhat.com/security/cve/CVE-2014-8130</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1185817">https://bugzilla.redhat.com/show_bug.cgi?id=1185817</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130</a><br><a href="https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543">https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543</a><br><a href="https://linux.oracle.com/cve/CVE-2014-8130.html">https://linux.oracle.com/cve/CVE-2014-8130.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2016-1547.html">https://linux.oracle.com/errata/ELSA-2016-1547.html</a><br><a href="https://security.gentoo.org/glsa/201701-16">https://security.gentoo.org/glsa/201701-16</a><br><a href="https://ubuntu.com/security/notices/USN-2553-1">https://ubuntu.com/security/notices/USN-2553-1</a><br></details> |
| libtiffxx5 | CVE-2017-16232 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html</a><br><a href="http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html">http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/32">http://seclists.org/fulldisclosure/2018/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/47">http://seclists.org/fulldisclosure/2018/Dec/47</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101696">http://www.securityfocus.com/bid/101696</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16232">https://access.redhat.com/security/cve/CVE-2017-16232</a><br></details> |
| libtiffxx5 | CVE-2017-17973 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2769">http://bugzilla.maptools.org/show_bug.cgi?id=2769</a><br><a href="http://www.securityfocus.com/bid/102331">http://www.securityfocus.com/bid/102331</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17973">https://access.redhat.com/security/cve/CVE-2017-17973</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=1074318">https://bugzilla.novell.com/show_bug.cgi?id=1074318</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1530912">https://bugzilla.redhat.com/show_bug.cgi?id=1530912</a><br></details> |
| libtiffxx5 | CVE-2017-5563 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2664">http://bugzilla.maptools.org/show_bug.cgi?id=2664</a><br><a href="http://www.securityfocus.com/bid/95705">http://www.securityfocus.com/bid/95705</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5563">https://access.redhat.com/security/cve/CVE-2017-5563</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563</a><br><a href="https://security.gentoo.org/glsa/201709-27">https://security.gentoo.org/glsa/201709-27</a><br><a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a><br><a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a><br></details> |
| libtiffxx5 | CVE-2017-9117 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2690">http://bugzilla.maptools.org/show_bug.cgi?id=2690</a><br><a href="http://www.securityfocus.com/bid/98581">http://www.securityfocus.com/bid/98581</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9117">https://access.redhat.com/security/cve/CVE-2017-9117</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117</a><br><a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a><br><a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a><br></details> |
| libtiffxx5 | CVE-2018-10126 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10126">https://access.redhat.com/security/cve/CVE-2018-10126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libtiffxx5 | CVE-2018-18661 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2819">http://bugzilla.maptools.org/show_bug.cgi?id=2819</a><br><a href="http://www.securityfocus.com/bid/105762">http://www.securityfocus.com/bid/105762</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2053">https://access.redhat.com/errata/RHSA-2019:2053</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-18661">https://access.redhat.com/security/cve/CVE-2018-18661</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661</a><br><a href="https://linux.oracle.com/cve/CVE-2018-18661.html">https://linux.oracle.com/cve/CVE-2018-18661.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2053.html">https://linux.oracle.com/errata/ELSA-2019-2053.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html</a><br><a href="https://ubuntu.com/security/notices/USN-3864-1">https://ubuntu.com/security/notices/USN-3864-1</a><br><a href="https://usn.ubuntu.com/3864-1/">https://usn.ubuntu.com/3864-1/</a><br></details> |
| libtiffxx5 | CVE-2019-6128 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2836">http://bugzilla.maptools.org/show_bug.cgi?id=2836</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html</a><br><a href="http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html">http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6128">https://access.redhat.com/security/cve/CVE-2019-6128</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128</a><br><a href="https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8">https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html</a><br><a href="https://seclists.org/bugtraq/2019/Nov/5">https://seclists.org/bugtraq/2019/Nov/5</a><br><a href="https://security.gentoo.org/glsa/202003-25">https://security.gentoo.org/glsa/202003-25</a><br><a href="https://ubuntu.com/security/notices/USN-3906-1">https://ubuntu.com/security/notices/USN-3906-1</a><br><a href="https://ubuntu.com/security/notices/USN-3906-2">https://ubuntu.com/security/notices/USN-3906-2</a><br><a href="https://usn.ubuntu.com/3906-1/">https://usn.ubuntu.com/3906-1/</a><br><a href="https://usn.ubuntu.com/3906-2/">https://usn.ubuntu.com/3906-2/</a><br></details> |
| libtiffxx5 | CVE-2020-35521 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35521">https://access.redhat.com/security/cve/CVE-2020-35521</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932034">https://bugzilla.redhat.com/show_bug.cgi?id=1932034</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35521.html">https://linux.oracle.com/cve/CVE-2020-35521.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">https://nvd.nist.gov/vuln/detail/CVE-2020-35521</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details> |
| libtiffxx5 | CVE-2020-35522 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35522">https://access.redhat.com/security/cve/CVE-2020-35522</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932037">https://bugzilla.redhat.com/show_bug.cgi?id=1932037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/165">https://gitlab.com/libtiff/libtiff/-/merge_requests/165</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35522.html">https://linux.oracle.com/cve/CVE-2020-35522.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4241.html">https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">https://nvd.nist.gov/vuln/detail/CVE-2020-35522</a><br><a href="https://security.gentoo.org/glsa/202104-06">https://security.gentoo.org/glsa/202104-06</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0009/">https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details> |
| libtiffxx5 | CVE-2022-1056 | LOW | 4.0.8-2+deb9u5 | | <details><summary>Expand...</summary><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json</a><br><a href="https://gitlab.com/libtiff/libtiff/-/issues/391">https://gitlab.com/libtiff/libtiff/-/issues/391</a><br><a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/307">https://gitlab.com/libtiff/libtiff/-/merge_requests/307</a><br></details> |
| libtinfo-dev | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| libtinfo-dev | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libtinfo-dev | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libtinfo-dev | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libtinfo5 | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| libtinfo5 | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libtinfo5 | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| libtinfo5 | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libtsan0 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libubsan0 | CVE-2018-12886 | HIGH | 6.3.0-18+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libudev1 | CVE-2019-3843 | HIGH | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2019-3844 | HIGH | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2020-1712 | HIGH | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1712">https://access.redhat.com/security/cve/CVE-2020-1712</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712</a><br><a href="https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54">https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54</a><br><a href="https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb">https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb</a><br><a href="https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d">https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d</a><br><a href="https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2">https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1712.html">https://linux.oracle.com/cve/CVE-2020-1712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-0575.html">https://linux.oracle.com/errata/ELSA-2020-0575.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">https://nvd.nist.gov/vuln/detail/CVE-2020-1712</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/02/05/1">https://www.openwall.com/lists/oss-security/2020/02/05/1</a><br></details> |
| libudev1 | CVE-2021-33910 | MEDIUM | 232-25+deb9u12 | 232-25+deb9u13 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html">http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33910">https://access.redhat.com/security/cve/CVE-2021-33910</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href="https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b">https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href="https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce">https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href="https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538">https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href="https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61">https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href="https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b">https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href="https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9">https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33910.html">https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2717.html">https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">https://nvd.nist.gov/vuln/detail/CVE-2021-33910</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0008/">https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br><a href="https://www.debian.org/security/2021/dsa-4942">https://www.debian.org/security/2021/dsa-4942</a><br><a href="https://www.openwall.com/lists/oss-security/2021/07/20/2">https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href="https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt">https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details> |
| libudev1 | CVE-2021-3997 | MEDIUM | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libudev1 | CVE-2013-4392 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libudev1 | CVE-2017-1000082 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/07/02/1">http://www.openwall.com/lists/oss-security/2017/07/02/1</a><br><a href="http://www.securityfocus.com/bid/99507">http://www.securityfocus.com/bid/99507</a><br><a href="http://www.securitytracker.com/id/1038839">http://www.securitytracker.com/id/1038839</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-1000082">https://access.redhat.com/security/cve/CVE-2017-1000082</a><br><a href="https://github.com/systemd/systemd/issues/6237">https://github.com/systemd/systemd/issues/6237</a><br></details> |
| libudev1 | CVE-2017-18078 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html">http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html</a><br><a href="http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html">http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/29/3">http://www.openwall.com/lists/oss-security/2018/01/29/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18078">https://access.redhat.com/security/cve/CVE-2017-18078</a><br><a href="https://github.com/systemd/systemd/issues/7736">https://github.com/systemd/systemd/issues/7736</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html">https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html</a><br><a href="https://www.exploit-db.com/exploits/43935/">https://www.exploit-db.com/exploits/43935/</a><br><a href="https://www.openwall.com/lists/oss-security/2018/01/29/4">https://www.openwall.com/lists/oss-security/2018/01/29/4</a><br></details> |
| libudev1 | CVE-2018-16888 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/errata/RHSA-2019:2091">https://access.redhat.com/errata/RHSA-2019:2091</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-16888">https://access.redhat.com/security/cve/CVE-2018-16888</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888</a><br><a href="https://linux.oracle.com/cve/CVE-2018-16888.html">https://linux.oracle.com/cve/CVE-2018-16888.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2091.html">https://linux.oracle.com/errata/ELSA-2019-2091.html</a><br><a href="https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E">https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190307-0007/">https://security.netapp.com/advisory/ntap-20190307-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2018-6954 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6954">https://access.redhat.com/security/cve/CVE-2018-6954</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954</a><br><a href="https://github.com/systemd/systemd/issues/7986">https://github.com/systemd/systemd/issues/7986</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-3816-1">https://ubuntu.com/security/notices/USN-3816-1</a><br><a href="https://ubuntu.com/security/notices/USN-3816-2">https://ubuntu.com/security/notices/USN-3816-2</a><br><a href="https://usn.ubuntu.com/3816-1/">https://usn.ubuntu.com/3816-1/</a><br><a href="https://usn.ubuntu.com/3816-2/">https://usn.ubuntu.com/3816-2/</a><br></details> |
| libudev1 | CVE-2019-20386 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2020-13529 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libudev1 | CVE-2020-13776 | LOW | 232-25+deb9u12 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libuuid1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| libuuid1 | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libuuid1 | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libwebp-dev | CVE-2018-25009 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25009">https://access.redhat.com/security/cve/CVE-2018-25009</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956917">https://bugzilla.redhat.com/show_bug.cgi?id=1956917</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25009.html">https://linux.oracle.com/cve/CVE-2018-25009.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">https://nvd.nist.gov/vuln/detail/CVE-2018-25009</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2018-25010 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25010">https://access.redhat.com/security/cve/CVE-2018-25010</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956918">https://bugzilla.redhat.com/show_bug.cgi?id=1956918</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25010.html">https://linux.oracle.com/cve/CVE-2018-25010.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">https://nvd.nist.gov/vuln/detail/CVE-2018-25010</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2018-25011 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25011">https://access.redhat.com/security/cve/CVE-2018-25011</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919">https://bugzilla.redhat.com/show_bug.cgi?id=1956919</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25011.html">https://linux.oracle.com/cve/CVE-2018-25011.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">https://nvd.nist.gov/vuln/detail/CVE-2018-25011</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2018-25012 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25012">https://access.redhat.com/security/cve/CVE-2018-25012</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956922">https://bugzilla.redhat.com/show_bug.cgi?id=1956922</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25012.html">https://linux.oracle.com/cve/CVE-2018-25012.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">https://nvd.nist.gov/vuln/detail/CVE-2018-25012</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br></details> |
| libwebp-dev | CVE-2018-25013 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25013">https://access.redhat.com/security/cve/CVE-2018-25013</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956926">https://bugzilla.redhat.com/show_bug.cgi?id=1956926</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25013.html">https://linux.oracle.com/cve/CVE-2018-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">https://nvd.nist.gov/vuln/detail/CVE-2018-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2018-25014 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25014">https://access.redhat.com/security/cve/CVE-2018-25014</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956927">https://bugzilla.redhat.com/show_bug.cgi?id=1956927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25014.html">https://linux.oracle.com/cve/CVE-2018-25014.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">https://nvd.nist.gov/vuln/detail/CVE-2018-25014</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2020-36328 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36328">https://access.redhat.com/security/cve/CVE-2020-36328</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829">https://bugzilla.redhat.com/show_bug.cgi?id=1956829</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36328.html">https://linux.oracle.com/cve/CVE-2020-36328.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">https://nvd.nist.gov/vuln/detail/CVE-2020-36328</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2020-36329 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36329">https://access.redhat.com/security/cve/CVE-2020-36329</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843">https://bugzilla.redhat.com/show_bug.cgi?id=1956843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36329.html">https://linux.oracle.com/cve/CVE-2020-36329.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">https://nvd.nist.gov/vuln/detail/CVE-2020-36329</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2020-36330 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36330">https://access.redhat.com/security/cve/CVE-2020-36330</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956853">https://bugzilla.redhat.com/show_bug.cgi?id=1956853</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36330.html">https://linux.oracle.com/cve/CVE-2020-36330.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">https://nvd.nist.gov/vuln/detail/CVE-2020-36330</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2020-36331 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36331">https://access.redhat.com/security/cve/CVE-2020-36331</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956856">https://bugzilla.redhat.com/show_bug.cgi?id=1956856</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36331.html">https://linux.oracle.com/cve/CVE-2020-36331.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">https://nvd.nist.gov/vuln/detail/CVE-2020-36331</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2020-36332 | HIGH | 0.5.2-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36332">https://access.redhat.com/security/cve/CVE-2020-36332</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956868">https://bugzilla.redhat.com/show_bug.cgi?id=1956868</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36332.html">https://linux.oracle.com/cve/CVE-2020-36332.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">https://nvd.nist.gov/vuln/detail/CVE-2020-36332</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp-dev | CVE-2016-9085 | LOW | 0.5.2-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/27/3">http://www.openwall.com/lists/oss-security/2016/10/27/3</a><br><a href="http://www.securityfocus.com/bid/93928">http://www.securityfocus.com/bid/93928</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9085">https://access.redhat.com/security/cve/CVE-2016-9085</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1389338">https://bugzilla.redhat.com/show_bug.cgi?id=1389338</a><br><a href="https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83">https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/</a><br><a href="https://security.gentoo.org/glsa/201701-61">https://security.gentoo.org/glsa/201701-61</a><br></details> |
| libwebp6 | CVE-2018-25009 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25009">https://access.redhat.com/security/cve/CVE-2018-25009</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956917">https://bugzilla.redhat.com/show_bug.cgi?id=1956917</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25009.html">https://linux.oracle.com/cve/CVE-2018-25009.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">https://nvd.nist.gov/vuln/detail/CVE-2018-25009</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2018-25010 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25010">https://access.redhat.com/security/cve/CVE-2018-25010</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956918">https://bugzilla.redhat.com/show_bug.cgi?id=1956918</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25010.html">https://linux.oracle.com/cve/CVE-2018-25010.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">https://nvd.nist.gov/vuln/detail/CVE-2018-25010</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2018-25011 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25011">https://access.redhat.com/security/cve/CVE-2018-25011</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919">https://bugzilla.redhat.com/show_bug.cgi?id=1956919</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25011.html">https://linux.oracle.com/cve/CVE-2018-25011.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">https://nvd.nist.gov/vuln/detail/CVE-2018-25011</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2018-25012 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25012">https://access.redhat.com/security/cve/CVE-2018-25012</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956922">https://bugzilla.redhat.com/show_bug.cgi?id=1956922</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25012.html">https://linux.oracle.com/cve/CVE-2018-25012.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">https://nvd.nist.gov/vuln/detail/CVE-2018-25012</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br></details> |
| libwebp6 | CVE-2018-25013 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25013">https://access.redhat.com/security/cve/CVE-2018-25013</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956926">https://bugzilla.redhat.com/show_bug.cgi?id=1956926</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25013.html">https://linux.oracle.com/cve/CVE-2018-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">https://nvd.nist.gov/vuln/detail/CVE-2018-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2018-25014 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25014">https://access.redhat.com/security/cve/CVE-2018-25014</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956927">https://bugzilla.redhat.com/show_bug.cgi?id=1956927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25014.html">https://linux.oracle.com/cve/CVE-2018-25014.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">https://nvd.nist.gov/vuln/detail/CVE-2018-25014</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2020-36328 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36328">https://access.redhat.com/security/cve/CVE-2020-36328</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829">https://bugzilla.redhat.com/show_bug.cgi?id=1956829</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36328.html">https://linux.oracle.com/cve/CVE-2020-36328.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">https://nvd.nist.gov/vuln/detail/CVE-2020-36328</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2020-36329 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36329">https://access.redhat.com/security/cve/CVE-2020-36329</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843">https://bugzilla.redhat.com/show_bug.cgi?id=1956843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36329.html">https://linux.oracle.com/cve/CVE-2020-36329.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">https://nvd.nist.gov/vuln/detail/CVE-2020-36329</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2020-36330 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36330">https://access.redhat.com/security/cve/CVE-2020-36330</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956853">https://bugzilla.redhat.com/show_bug.cgi?id=1956853</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36330.html">https://linux.oracle.com/cve/CVE-2020-36330.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">https://nvd.nist.gov/vuln/detail/CVE-2020-36330</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2020-36331 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36331">https://access.redhat.com/security/cve/CVE-2020-36331</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956856">https://bugzilla.redhat.com/show_bug.cgi?id=1956856</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36331.html">https://linux.oracle.com/cve/CVE-2020-36331.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">https://nvd.nist.gov/vuln/detail/CVE-2020-36331</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2020-36332 | HIGH | 0.5.2-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36332">https://access.redhat.com/security/cve/CVE-2020-36332</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956868">https://bugzilla.redhat.com/show_bug.cgi?id=1956868</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36332.html">https://linux.oracle.com/cve/CVE-2020-36332.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">https://nvd.nist.gov/vuln/detail/CVE-2020-36332</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebp6 | CVE-2016-9085 | LOW | 0.5.2-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/27/3">http://www.openwall.com/lists/oss-security/2016/10/27/3</a><br><a href="http://www.securityfocus.com/bid/93928">http://www.securityfocus.com/bid/93928</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9085">https://access.redhat.com/security/cve/CVE-2016-9085</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1389338">https://bugzilla.redhat.com/show_bug.cgi?id=1389338</a><br><a href="https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83">https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/</a><br><a href="https://security.gentoo.org/glsa/201701-61">https://security.gentoo.org/glsa/201701-61</a><br></details> |
| libwebpdemux2 | CVE-2018-25009 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25009">https://access.redhat.com/security/cve/CVE-2018-25009</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956917">https://bugzilla.redhat.com/show_bug.cgi?id=1956917</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25009.html">https://linux.oracle.com/cve/CVE-2018-25009.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">https://nvd.nist.gov/vuln/detail/CVE-2018-25009</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2018-25010 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25010">https://access.redhat.com/security/cve/CVE-2018-25010</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956918">https://bugzilla.redhat.com/show_bug.cgi?id=1956918</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25010.html">https://linux.oracle.com/cve/CVE-2018-25010.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">https://nvd.nist.gov/vuln/detail/CVE-2018-25010</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2018-25011 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25011">https://access.redhat.com/security/cve/CVE-2018-25011</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919">https://bugzilla.redhat.com/show_bug.cgi?id=1956919</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25011.html">https://linux.oracle.com/cve/CVE-2018-25011.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">https://nvd.nist.gov/vuln/detail/CVE-2018-25011</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2018-25012 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25012">https://access.redhat.com/security/cve/CVE-2018-25012</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956922">https://bugzilla.redhat.com/show_bug.cgi?id=1956922</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25012.html">https://linux.oracle.com/cve/CVE-2018-25012.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">https://nvd.nist.gov/vuln/detail/CVE-2018-25012</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br></details> |
| libwebpdemux2 | CVE-2018-25013 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25013">https://access.redhat.com/security/cve/CVE-2018-25013</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956926">https://bugzilla.redhat.com/show_bug.cgi?id=1956926</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25013.html">https://linux.oracle.com/cve/CVE-2018-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">https://nvd.nist.gov/vuln/detail/CVE-2018-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2018-25014 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25014">https://access.redhat.com/security/cve/CVE-2018-25014</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956927">https://bugzilla.redhat.com/show_bug.cgi?id=1956927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25014.html">https://linux.oracle.com/cve/CVE-2018-25014.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">https://nvd.nist.gov/vuln/detail/CVE-2018-25014</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2020-36328 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36328">https://access.redhat.com/security/cve/CVE-2020-36328</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829">https://bugzilla.redhat.com/show_bug.cgi?id=1956829</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36328.html">https://linux.oracle.com/cve/CVE-2020-36328.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">https://nvd.nist.gov/vuln/detail/CVE-2020-36328</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2020-36329 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36329">https://access.redhat.com/security/cve/CVE-2020-36329</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843">https://bugzilla.redhat.com/show_bug.cgi?id=1956843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36329.html">https://linux.oracle.com/cve/CVE-2020-36329.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">https://nvd.nist.gov/vuln/detail/CVE-2020-36329</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2020-36330 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36330">https://access.redhat.com/security/cve/CVE-2020-36330</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956853">https://bugzilla.redhat.com/show_bug.cgi?id=1956853</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36330.html">https://linux.oracle.com/cve/CVE-2020-36330.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">https://nvd.nist.gov/vuln/detail/CVE-2020-36330</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2020-36331 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36331">https://access.redhat.com/security/cve/CVE-2020-36331</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956856">https://bugzilla.redhat.com/show_bug.cgi?id=1956856</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36331.html">https://linux.oracle.com/cve/CVE-2020-36331.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">https://nvd.nist.gov/vuln/detail/CVE-2020-36331</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2020-36332 | HIGH | 0.5.2-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36332">https://access.redhat.com/security/cve/CVE-2020-36332</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956868">https://bugzilla.redhat.com/show_bug.cgi?id=1956868</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36332.html">https://linux.oracle.com/cve/CVE-2020-36332.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">https://nvd.nist.gov/vuln/detail/CVE-2020-36332</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpdemux2 | CVE-2016-9085 | LOW | 0.5.2-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/27/3">http://www.openwall.com/lists/oss-security/2016/10/27/3</a><br><a href="http://www.securityfocus.com/bid/93928">http://www.securityfocus.com/bid/93928</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9085">https://access.redhat.com/security/cve/CVE-2016-9085</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1389338">https://bugzilla.redhat.com/show_bug.cgi?id=1389338</a><br><a href="https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83">https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/</a><br><a href="https://security.gentoo.org/glsa/201701-61">https://security.gentoo.org/glsa/201701-61</a><br></details> |
| libwebpmux2 | CVE-2018-25009 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25009">https://access.redhat.com/security/cve/CVE-2018-25009</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956917">https://bugzilla.redhat.com/show_bug.cgi?id=1956917</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25009.html">https://linux.oracle.com/cve/CVE-2018-25009.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">https://nvd.nist.gov/vuln/detail/CVE-2018-25009</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2018-25010 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25010">https://access.redhat.com/security/cve/CVE-2018-25010</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956918">https://bugzilla.redhat.com/show_bug.cgi?id=1956918</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25010.html">https://linux.oracle.com/cve/CVE-2018-25010.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">https://nvd.nist.gov/vuln/detail/CVE-2018-25010</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2018-25011 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25011">https://access.redhat.com/security/cve/CVE-2018-25011</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919">https://bugzilla.redhat.com/show_bug.cgi?id=1956919</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25011.html">https://linux.oracle.com/cve/CVE-2018-25011.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">https://nvd.nist.gov/vuln/detail/CVE-2018-25011</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2018-25012 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25012">https://access.redhat.com/security/cve/CVE-2018-25012</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956922">https://bugzilla.redhat.com/show_bug.cgi?id=1956922</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25012.html">https://linux.oracle.com/cve/CVE-2018-25012.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">https://nvd.nist.gov/vuln/detail/CVE-2018-25012</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br></details> |
| libwebpmux2 | CVE-2018-25013 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-25013">https://access.redhat.com/security/cve/CVE-2018-25013</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956926">https://bugzilla.redhat.com/show_bug.cgi?id=1956926</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25013.html">https://linux.oracle.com/cve/CVE-2018-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">https://nvd.nist.gov/vuln/detail/CVE-2018-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2018-25014 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25014">https://access.redhat.com/security/cve/CVE-2018-25014</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956927">https://bugzilla.redhat.com/show_bug.cgi?id=1956927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25014.html">https://linux.oracle.com/cve/CVE-2018-25014.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">https://nvd.nist.gov/vuln/detail/CVE-2018-25014</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2020-36328 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36328">https://access.redhat.com/security/cve/CVE-2020-36328</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829">https://bugzilla.redhat.com/show_bug.cgi?id=1956829</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36328.html">https://linux.oracle.com/cve/CVE-2020-36328.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">https://nvd.nist.gov/vuln/detail/CVE-2020-36328</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2020-36329 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36329">https://access.redhat.com/security/cve/CVE-2020-36329</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843">https://bugzilla.redhat.com/show_bug.cgi?id=1956843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36329.html">https://linux.oracle.com/cve/CVE-2020-36329.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2354.html">https://linux.oracle.com/errata/ELSA-2021-2354.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">https://nvd.nist.gov/vuln/detail/CVE-2020-36329</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2020-36330 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36330">https://access.redhat.com/security/cve/CVE-2020-36330</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956853">https://bugzilla.redhat.com/show_bug.cgi?id=1956853</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36330.html">https://linux.oracle.com/cve/CVE-2020-36330.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">https://nvd.nist.gov/vuln/detail/CVE-2020-36330</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2020-36331 | CRITICAL | 0.5.2-1 | 0.5.2-1+deb9u1 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-36331">https://access.redhat.com/security/cve/CVE-2020-36331</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956856">https://bugzilla.redhat.com/show_bug.cgi?id=1956856</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36331.html">https://linux.oracle.com/cve/CVE-2020-36331.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">https://nvd.nist.gov/vuln/detail/CVE-2020-36331</a><br><a href="https://security.netapp.com/advisory/ntap-20211112-0001/">https://security.netapp.com/advisory/ntap-20211112-0001/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://ubuntu.com/security/notices/USN-4971-2">https://ubuntu.com/security/notices/USN-4971-2</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2020-36332 | HIGH | 0.5.2-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36332">https://access.redhat.com/security/cve/CVE-2020-36332</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956868">https://bugzilla.redhat.com/show_bug.cgi?id=1956868</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36332.html">https://linux.oracle.com/cve/CVE-2020-36332.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4231.html">https://linux.oracle.com/errata/ELSA-2021-4231.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">https://nvd.nist.gov/vuln/detail/CVE-2020-36332</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0004/">https://security.netapp.com/advisory/ntap-20211104-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4971-1">https://ubuntu.com/security/notices/USN-4971-1</a><br><a href="https://www.debian.org/security/2021/dsa-4930">https://www.debian.org/security/2021/dsa-4930</a><br></details> |
| libwebpmux2 | CVE-2016-9085 | LOW | 0.5.2-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/27/3">http://www.openwall.com/lists/oss-security/2016/10/27/3</a><br><a href="http://www.securityfocus.com/bid/93928">http://www.securityfocus.com/bid/93928</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9085">https://access.redhat.com/security/cve/CVE-2016-9085</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1389338">https://bugzilla.redhat.com/show_bug.cgi?id=1389338</a><br><a href="https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83">https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/</a><br><a href="https://security.gentoo.org/glsa/201701-61">https://security.gentoo.org/glsa/201701-61</a><br></details> |
| libwmf-dev | CVE-2007-3476 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz">ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz</a><br><a href="http://bugs.libgd.org/?do=details&amp;task_id=87">http://bugs.libgd.org/?do=details&amp;task_id=87</a><br><a href="http://fedoranews.org/updates/FEDORA-2007-205.shtml">http://fedoranews.org/updates/FEDORA-2007-205.shtml</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html</a><br><a href="http://osvdb.org/37741">http://osvdb.org/37741</a><br><a href="http://secunia.com/advisories/25860">http://secunia.com/advisories/25860</a><br><a href="http://secunia.com/advisories/26272">http://secunia.com/advisories/26272</a><br><a href="http://secunia.com/advisories/26390">http://secunia.com/advisories/26390</a><br><a href="http://secunia.com/advisories/26415">http://secunia.com/advisories/26415</a><br><a href="http://secunia.com/advisories/26467">http://secunia.com/advisories/26467</a><br><a href="http://secunia.com/advisories/26663">http://secunia.com/advisories/26663</a><br><a href="http://secunia.com/advisories/26766">http://secunia.com/advisories/26766</a><br><a href="http://secunia.com/advisories/26856">http://secunia.com/advisories/26856</a><br><a href="http://secunia.com/advisories/29157">http://secunia.com/advisories/29157</a><br><a href="http://secunia.com/advisories/30168">http://secunia.com/advisories/30168</a><br><a href="http://secunia.com/advisories/31168">http://secunia.com/advisories/31168</a><br><a href="http://secunia.com/advisories/42813">http://secunia.com/advisories/42813</a><br><a href="http://security.gentoo.org/glsa/glsa-200708-05.xml">http://security.gentoo.org/glsa/glsa-200708-05.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200711-34.xml">http://security.gentoo.org/glsa/glsa-200711-34.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200805-13.xml">http://security.gentoo.org/glsa/glsa-200805-13.xml</a><br><a href="http://www.debian.org/security/2008/dsa-1613">http://www.debian.org/security/2008/dsa-1613</a><br><a href="http://www.libgd.org/ReleaseNote020035">http://www.libgd.org/ReleaseNote020035</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:153">http://www.mandriva.com/security/advisories?name=MDKSA-2007:153</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:164">http://www.mandriva.com/security/advisories?name=MDKSA-2007:164</a><br><a href="http://www.novell.com/linux/security/advisories/2007_15_sr.html">http://www.novell.com/linux/security/advisories/2007_15_sr.html</a><br><a href="http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html">http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2008-0146.html">http://www.redhat.com/support/errata/RHSA-2008-0146.html</a><br><a href="http://www.securityfocus.com/archive/1/478796/100/0/threaded">http://www.securityfocus.com/archive/1/478796/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/24651">http://www.securityfocus.com/bid/24651</a><br><a href="http://www.trustix.org/errata/2007/0024/">http://www.trustix.org/errata/2007/0024/</a><br><a href="http://www.vupen.com/english/advisories/2011/0022">http://www.vupen.com/english/advisories/2011/0022</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3476">https://access.redhat.com/security/cve/CVE-2007-3476</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=277421">https://bugzilla.redhat.com/show_bug.cgi?id=277421</a><br><a href="https://issues.rpath.com/browse/RPL-1643">https://issues.rpath.com/browse/RPL-1643</a><br><a href="https://linux.oracle.com/cve/CVE-2007-3476.html">https://linux.oracle.com/cve/CVE-2007-3476.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2008-0146.html">https://linux.oracle.com/errata/ELSA-2008-0146.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348</a><br></details> |
| libwmf-dev | CVE-2007-3477 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz">ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz</a><br><a href="http://bugs.libgd.org/?do=details&amp;task_id=74">http://bugs.libgd.org/?do=details&amp;task_id=74</a><br><a href="http://bugs.libgd.org/?do=details&amp;task_id=92">http://bugs.libgd.org/?do=details&amp;task_id=92</a><br><a href="http://fedoranews.org/updates/FEDORA-2007-205.shtml">http://fedoranews.org/updates/FEDORA-2007-205.shtml</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html</a><br><a href="http://osvdb.org/42062">http://osvdb.org/42062</a><br><a href="http://secunia.com/advisories/25860">http://secunia.com/advisories/25860</a><br><a href="http://secunia.com/advisories/26272">http://secunia.com/advisories/26272</a><br><a href="http://secunia.com/advisories/26390">http://secunia.com/advisories/26390</a><br><a href="http://secunia.com/advisories/26415">http://secunia.com/advisories/26415</a><br><a href="http://secunia.com/advisories/26467">http://secunia.com/advisories/26467</a><br><a href="http://secunia.com/advisories/26663">http://secunia.com/advisories/26663</a><br><a href="http://secunia.com/advisories/26766">http://secunia.com/advisories/26766</a><br><a href="http://secunia.com/advisories/26856">http://secunia.com/advisories/26856</a><br><a href="http://secunia.com/advisories/30168">http://secunia.com/advisories/30168</a><br><a href="http://secunia.com/advisories/31168">http://secunia.com/advisories/31168</a><br><a href="http://secunia.com/advisories/42813">http://secunia.com/advisories/42813</a><br><a href="http://security.gentoo.org/glsa/glsa-200708-05.xml">http://security.gentoo.org/glsa/glsa-200708-05.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200711-34.xml">http://security.gentoo.org/glsa/glsa-200711-34.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200805-13.xml">http://security.gentoo.org/glsa/glsa-200805-13.xml</a><br><a href="http://www.debian.org/security/2008/dsa-1613">http://www.debian.org/security/2008/dsa-1613</a><br><a href="http://www.libgd.org/ReleaseNote020035">http://www.libgd.org/ReleaseNote020035</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:153">http://www.mandriva.com/security/advisories?name=MDKSA-2007:153</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:164">http://www.mandriva.com/security/advisories?name=MDKSA-2007:164</a><br><a href="http://www.novell.com/linux/security/advisories/2007_15_sr.html">http://www.novell.com/linux/security/advisories/2007_15_sr.html</a><br><a href="http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html">http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html</a><br><a href="http://www.securityfocus.com/archive/1/478796/100/0/threaded">http://www.securityfocus.com/archive/1/478796/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/24651">http://www.securityfocus.com/bid/24651</a><br><a href="http://www.trustix.org/errata/2007/0024/">http://www.trustix.org/errata/2007/0024/</a><br><a href="http://www.vupen.com/english/advisories/2011/0022">http://www.vupen.com/english/advisories/2011/0022</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3477">https://access.redhat.com/security/cve/CVE-2007-3477</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=277421">https://bugzilla.redhat.com/show_bug.cgi?id=277421</a><br><a href="https://issues.rpath.com/browse/RPL-1643">https://issues.rpath.com/browse/RPL-1643</a><br></details> |
| libwmf-dev | CVE-2007-3996 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="http://bugs.gentoo.org/show_bug.cgi?id=201546">http://bugs.gentoo.org/show_bug.cgi?id=201546</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2007-0889.html">http://rhn.redhat.com/errata/RHSA-2007-0889.html</a><br><a href="http://secunia.com/advisories/26642">http://secunia.com/advisories/26642</a><br><a href="http://secunia.com/advisories/26822">http://secunia.com/advisories/26822</a><br><a href="http://secunia.com/advisories/26838">http://secunia.com/advisories/26838</a><br><a href="http://secunia.com/advisories/26871">http://secunia.com/advisories/26871</a><br><a href="http://secunia.com/advisories/26895">http://secunia.com/advisories/26895</a><br><a href="http://secunia.com/advisories/26930">http://secunia.com/advisories/26930</a><br><a href="http://secunia.com/advisories/26967">http://secunia.com/advisories/26967</a><br><a href="http://secunia.com/advisories/27102">http://secunia.com/advisories/27102</a><br><a href="http://secunia.com/advisories/27351">http://secunia.com/advisories/27351</a><br><a href="http://secunia.com/advisories/27377">http://secunia.com/advisories/27377</a><br><a href="http://secunia.com/advisories/27545">http://secunia.com/advisories/27545</a><br><a href="http://secunia.com/advisories/28009">http://secunia.com/advisories/28009</a><br><a href="http://secunia.com/advisories/28147">http://secunia.com/advisories/28147</a><br><a href="http://secunia.com/advisories/28658">http://secunia.com/advisories/28658</a><br><a href="http://secunia.com/advisories/31168">http://secunia.com/advisories/31168</a><br><a href="http://security.gentoo.org/glsa/glsa-200712-13.xml">http://security.gentoo.org/glsa/glsa-200712-13.xml</a><br><a href="http://securityreason.com/securityalert/3103">http://securityreason.com/securityalert/3103</a><br><a href="http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/">http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/</a><br><a href="http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/">http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/</a><br><a href="http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm">http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm</a><br><a href="http://www.debian.org/security/2008/dsa-1613">http://www.debian.org/security/2008/dsa-1613</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml">http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:187">http://www.mandriva.com/security/advisories?name=MDKSA-2007:187</a><br><a href="http://www.php.net/ChangeLog-5.php#5.2.4">http://www.php.net/ChangeLog-5.php#5.2.4</a><br><a href="http://www.php.net/releases/5_2_4.php">http://www.php.net/releases/5_2_4.php</a><br><a href="http://www.redhat.com/support/errata/RHSA-2007-0888.html">http://www.redhat.com/support/errata/RHSA-2007-0888.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2007-0890.html">http://www.redhat.com/support/errata/RHSA-2007-0890.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2007-0891.html">http://www.redhat.com/support/errata/RHSA-2007-0891.html</a><br><a href="http://www.trustix.org/errata/2007/0026/">http://www.trustix.org/errata/2007/0026/</a><br><a href="http://www.ubuntu.com/usn/usn-557-1">http://www.ubuntu.com/usn/usn-557-1</a><br><a href="http://www.vupen.com/english/advisories/2007/3023">http://www.vupen.com/english/advisories/2007/3023</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3996">https://access.redhat.com/security/cve/CVE-2007-3996</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/36382">https://exchange.xforce.ibmcloud.com/vulnerabilities/36382</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/36383">https://exchange.xforce.ibmcloud.com/vulnerabilities/36383</a><br><a href="https://issues.rpath.com/browse/RPL-1693">https://issues.rpath.com/browse/RPL-1693</a><br><a href="https://issues.rpath.com/browse/RPL-1702">https://issues.rpath.com/browse/RPL-1702</a><br><a href="https://linux.oracle.com/cve/CVE-2007-3996.html">https://linux.oracle.com/cve/CVE-2007-3996.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2007-0890.html">https://linux.oracle.com/errata/ELSA-2007-0890.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147</a><br><a href="https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html">https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html</a><br></details> |
| libwmf-dev | CVE-2009-3546 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=oss-security&amp;m=125562113503923&amp;w=2">http://marc.info/?l=oss-security&amp;m=125562113503923&amp;w=2</a><br><a href="http://secunia.com/advisories/37069">http://secunia.com/advisories/37069</a><br><a href="http://secunia.com/advisories/37080">http://secunia.com/advisories/37080</a><br><a href="http://secunia.com/advisories/38055">http://secunia.com/advisories/38055</a><br><a href="http://svn.php.net/viewvc?view=revision&amp;revision=289557">http://svn.php.net/viewvc?view=revision&amp;revision=289557</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:285">http://www.mandriva.com/security/advisories?name=MDVSA-2009:285</a><br><a href="http://www.openwall.com/lists/oss-security/2009/11/20/5">http://www.openwall.com/lists/oss-security/2009/11/20/5</a><br><a href="http://www.redhat.com/support/errata/RHSA-2010-0003.html">http://www.redhat.com/support/errata/RHSA-2010-0003.html</a><br><a href="http://www.securityfocus.com/bid/36712">http://www.securityfocus.com/bid/36712</a><br><a href="http://www.vupen.com/english/advisories/2009/2929">http://www.vupen.com/english/advisories/2009/2929</a><br><a href="http://www.vupen.com/english/advisories/2009/2930">http://www.vupen.com/english/advisories/2009/2930</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-3546">https://access.redhat.com/security/cve/CVE-2009-3546</a><br><a href="https://linux.oracle.com/cve/CVE-2009-3546.html">https://linux.oracle.com/cve/CVE-2009-3546.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2010-0040.html">https://linux.oracle.com/errata/ELSA-2010-0040.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199</a><br></details> |
| libwmf0.2-7 | CVE-2007-3476 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz">ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz</a><br><a href="http://bugs.libgd.org/?do=details&amp;task_id=87">http://bugs.libgd.org/?do=details&amp;task_id=87</a><br><a href="http://fedoranews.org/updates/FEDORA-2007-205.shtml">http://fedoranews.org/updates/FEDORA-2007-205.shtml</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html</a><br><a href="http://osvdb.org/37741">http://osvdb.org/37741</a><br><a href="http://secunia.com/advisories/25860">http://secunia.com/advisories/25860</a><br><a href="http://secunia.com/advisories/26272">http://secunia.com/advisories/26272</a><br><a href="http://secunia.com/advisories/26390">http://secunia.com/advisories/26390</a><br><a href="http://secunia.com/advisories/26415">http://secunia.com/advisories/26415</a><br><a href="http://secunia.com/advisories/26467">http://secunia.com/advisories/26467</a><br><a href="http://secunia.com/advisories/26663">http://secunia.com/advisories/26663</a><br><a href="http://secunia.com/advisories/26766">http://secunia.com/advisories/26766</a><br><a href="http://secunia.com/advisories/26856">http://secunia.com/advisories/26856</a><br><a href="http://secunia.com/advisories/29157">http://secunia.com/advisories/29157</a><br><a href="http://secunia.com/advisories/30168">http://secunia.com/advisories/30168</a><br><a href="http://secunia.com/advisories/31168">http://secunia.com/advisories/31168</a><br><a href="http://secunia.com/advisories/42813">http://secunia.com/advisories/42813</a><br><a href="http://security.gentoo.org/glsa/glsa-200708-05.xml">http://security.gentoo.org/glsa/glsa-200708-05.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200711-34.xml">http://security.gentoo.org/glsa/glsa-200711-34.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200805-13.xml">http://security.gentoo.org/glsa/glsa-200805-13.xml</a><br><a href="http://www.debian.org/security/2008/dsa-1613">http://www.debian.org/security/2008/dsa-1613</a><br><a href="http://www.libgd.org/ReleaseNote020035">http://www.libgd.org/ReleaseNote020035</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:153">http://www.mandriva.com/security/advisories?name=MDKSA-2007:153</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:164">http://www.mandriva.com/security/advisories?name=MDKSA-2007:164</a><br><a href="http://www.novell.com/linux/security/advisories/2007_15_sr.html">http://www.novell.com/linux/security/advisories/2007_15_sr.html</a><br><a href="http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html">http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2008-0146.html">http://www.redhat.com/support/errata/RHSA-2008-0146.html</a><br><a href="http://www.securityfocus.com/archive/1/478796/100/0/threaded">http://www.securityfocus.com/archive/1/478796/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/24651">http://www.securityfocus.com/bid/24651</a><br><a href="http://www.trustix.org/errata/2007/0024/">http://www.trustix.org/errata/2007/0024/</a><br><a href="http://www.vupen.com/english/advisories/2011/0022">http://www.vupen.com/english/advisories/2011/0022</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3476">https://access.redhat.com/security/cve/CVE-2007-3476</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=277421">https://bugzilla.redhat.com/show_bug.cgi?id=277421</a><br><a href="https://issues.rpath.com/browse/RPL-1643">https://issues.rpath.com/browse/RPL-1643</a><br><a href="https://linux.oracle.com/cve/CVE-2007-3476.html">https://linux.oracle.com/cve/CVE-2007-3476.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2008-0146.html">https://linux.oracle.com/errata/ELSA-2008-0146.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348</a><br></details> |
| libwmf0.2-7 | CVE-2007-3477 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz">ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz</a><br><a href="http://bugs.libgd.org/?do=details&amp;task_id=74">http://bugs.libgd.org/?do=details&amp;task_id=74</a><br><a href="http://bugs.libgd.org/?do=details&amp;task_id=92">http://bugs.libgd.org/?do=details&amp;task_id=92</a><br><a href="http://fedoranews.org/updates/FEDORA-2007-205.shtml">http://fedoranews.org/updates/FEDORA-2007-205.shtml</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html</a><br><a href="http://osvdb.org/42062">http://osvdb.org/42062</a><br><a href="http://secunia.com/advisories/25860">http://secunia.com/advisories/25860</a><br><a href="http://secunia.com/advisories/26272">http://secunia.com/advisories/26272</a><br><a href="http://secunia.com/advisories/26390">http://secunia.com/advisories/26390</a><br><a href="http://secunia.com/advisories/26415">http://secunia.com/advisories/26415</a><br><a href="http://secunia.com/advisories/26467">http://secunia.com/advisories/26467</a><br><a href="http://secunia.com/advisories/26663">http://secunia.com/advisories/26663</a><br><a href="http://secunia.com/advisories/26766">http://secunia.com/advisories/26766</a><br><a href="http://secunia.com/advisories/26856">http://secunia.com/advisories/26856</a><br><a href="http://secunia.com/advisories/30168">http://secunia.com/advisories/30168</a><br><a href="http://secunia.com/advisories/31168">http://secunia.com/advisories/31168</a><br><a href="http://secunia.com/advisories/42813">http://secunia.com/advisories/42813</a><br><a href="http://security.gentoo.org/glsa/glsa-200708-05.xml">http://security.gentoo.org/glsa/glsa-200708-05.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200711-34.xml">http://security.gentoo.org/glsa/glsa-200711-34.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-200805-13.xml">http://security.gentoo.org/glsa/glsa-200805-13.xml</a><br><a href="http://www.debian.org/security/2008/dsa-1613">http://www.debian.org/security/2008/dsa-1613</a><br><a href="http://www.libgd.org/ReleaseNote020035">http://www.libgd.org/ReleaseNote020035</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:153">http://www.mandriva.com/security/advisories?name=MDKSA-2007:153</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:164">http://www.mandriva.com/security/advisories?name=MDKSA-2007:164</a><br><a href="http://www.novell.com/linux/security/advisories/2007_15_sr.html">http://www.novell.com/linux/security/advisories/2007_15_sr.html</a><br><a href="http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html">http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html</a><br><a href="http://www.securityfocus.com/archive/1/478796/100/0/threaded">http://www.securityfocus.com/archive/1/478796/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/24651">http://www.securityfocus.com/bid/24651</a><br><a href="http://www.trustix.org/errata/2007/0024/">http://www.trustix.org/errata/2007/0024/</a><br><a href="http://www.vupen.com/english/advisories/2011/0022">http://www.vupen.com/english/advisories/2011/0022</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3477">https://access.redhat.com/security/cve/CVE-2007-3477</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=277421">https://bugzilla.redhat.com/show_bug.cgi?id=277421</a><br><a href="https://issues.rpath.com/browse/RPL-1643">https://issues.rpath.com/browse/RPL-1643</a><br></details> |
| libwmf0.2-7 | CVE-2007-3996 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="http://bugs.gentoo.org/show_bug.cgi?id=201546">http://bugs.gentoo.org/show_bug.cgi?id=201546</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2007-0889.html">http://rhn.redhat.com/errata/RHSA-2007-0889.html</a><br><a href="http://secunia.com/advisories/26642">http://secunia.com/advisories/26642</a><br><a href="http://secunia.com/advisories/26822">http://secunia.com/advisories/26822</a><br><a href="http://secunia.com/advisories/26838">http://secunia.com/advisories/26838</a><br><a href="http://secunia.com/advisories/26871">http://secunia.com/advisories/26871</a><br><a href="http://secunia.com/advisories/26895">http://secunia.com/advisories/26895</a><br><a href="http://secunia.com/advisories/26930">http://secunia.com/advisories/26930</a><br><a href="http://secunia.com/advisories/26967">http://secunia.com/advisories/26967</a><br><a href="http://secunia.com/advisories/27102">http://secunia.com/advisories/27102</a><br><a href="http://secunia.com/advisories/27351">http://secunia.com/advisories/27351</a><br><a href="http://secunia.com/advisories/27377">http://secunia.com/advisories/27377</a><br><a href="http://secunia.com/advisories/27545">http://secunia.com/advisories/27545</a><br><a href="http://secunia.com/advisories/28009">http://secunia.com/advisories/28009</a><br><a href="http://secunia.com/advisories/28147">http://secunia.com/advisories/28147</a><br><a href="http://secunia.com/advisories/28658">http://secunia.com/advisories/28658</a><br><a href="http://secunia.com/advisories/31168">http://secunia.com/advisories/31168</a><br><a href="http://security.gentoo.org/glsa/glsa-200712-13.xml">http://security.gentoo.org/glsa/glsa-200712-13.xml</a><br><a href="http://securityreason.com/securityalert/3103">http://securityreason.com/securityalert/3103</a><br><a href="http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/">http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/</a><br><a href="http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/">http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/</a><br><a href="http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm">http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm</a><br><a href="http://www.debian.org/security/2008/dsa-1613">http://www.debian.org/security/2008/dsa-1613</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml">http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml</a><br><a href="http://www.mandriva.com/security/advisories?name=MDKSA-2007:187">http://www.mandriva.com/security/advisories?name=MDKSA-2007:187</a><br><a href="http://www.php.net/ChangeLog-5.php#5.2.4">http://www.php.net/ChangeLog-5.php#5.2.4</a><br><a href="http://www.php.net/releases/5_2_4.php">http://www.php.net/releases/5_2_4.php</a><br><a href="http://www.redhat.com/support/errata/RHSA-2007-0888.html">http://www.redhat.com/support/errata/RHSA-2007-0888.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2007-0890.html">http://www.redhat.com/support/errata/RHSA-2007-0890.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2007-0891.html">http://www.redhat.com/support/errata/RHSA-2007-0891.html</a><br><a href="http://www.trustix.org/errata/2007/0026/">http://www.trustix.org/errata/2007/0026/</a><br><a href="http://www.ubuntu.com/usn/usn-557-1">http://www.ubuntu.com/usn/usn-557-1</a><br><a href="http://www.vupen.com/english/advisories/2007/3023">http://www.vupen.com/english/advisories/2007/3023</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3996">https://access.redhat.com/security/cve/CVE-2007-3996</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/36382">https://exchange.xforce.ibmcloud.com/vulnerabilities/36382</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/36383">https://exchange.xforce.ibmcloud.com/vulnerabilities/36383</a><br><a href="https://issues.rpath.com/browse/RPL-1693">https://issues.rpath.com/browse/RPL-1693</a><br><a href="https://issues.rpath.com/browse/RPL-1702">https://issues.rpath.com/browse/RPL-1702</a><br><a href="https://linux.oracle.com/cve/CVE-2007-3996.html">https://linux.oracle.com/cve/CVE-2007-3996.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2007-0890.html">https://linux.oracle.com/errata/ELSA-2007-0890.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147</a><br><a href="https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html">https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html</a><br></details> |
| libwmf0.2-7 | CVE-2009-3546 | LOW | 0.2.8.4-10.6 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=oss-security&amp;m=125562113503923&amp;w=2">http://marc.info/?l=oss-security&amp;m=125562113503923&amp;w=2</a><br><a href="http://secunia.com/advisories/37069">http://secunia.com/advisories/37069</a><br><a href="http://secunia.com/advisories/37080">http://secunia.com/advisories/37080</a><br><a href="http://secunia.com/advisories/38055">http://secunia.com/advisories/38055</a><br><a href="http://svn.php.net/viewvc?view=revision&amp;revision=289557">http://svn.php.net/viewvc?view=revision&amp;revision=289557</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:285">http://www.mandriva.com/security/advisories?name=MDVSA-2009:285</a><br><a href="http://www.openwall.com/lists/oss-security/2009/11/20/5">http://www.openwall.com/lists/oss-security/2009/11/20/5</a><br><a href="http://www.redhat.com/support/errata/RHSA-2010-0003.html">http://www.redhat.com/support/errata/RHSA-2010-0003.html</a><br><a href="http://www.securityfocus.com/bid/36712">http://www.securityfocus.com/bid/36712</a><br><a href="http://www.vupen.com/english/advisories/2009/2929">http://www.vupen.com/english/advisories/2009/2929</a><br><a href="http://www.vupen.com/english/advisories/2009/2930">http://www.vupen.com/english/advisories/2009/2930</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-3546">https://access.redhat.com/security/cve/CVE-2009-3546</a><br><a href="https://linux.oracle.com/cve/CVE-2009-3546.html">https://linux.oracle.com/cve/CVE-2009-3546.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2010-0040.html">https://linux.oracle.com/errata/ELSA-2010-0040.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199</a><br></details> |
| libx11-6 | CVE-2021-31535 | CRITICAL | 2:1.6.4-3+deb9u3 | 2:1.6.4-3+deb9u4 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html">http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html</a><br><a href="http://seclists.org/fulldisclosure/2021/May/52">http://seclists.org/fulldisclosure/2021/May/52</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/18/2">http://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-31535">https://access.redhat.com/security/cve/CVE-2021-31535</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535</a><br><a href="https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605">https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605</a><br><a href="https://linux.oracle.com/cve/CVE-2021-31535.html">https://linux.oracle.com/cve/CVE-2021-31535.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4326.html">https://linux.oracle.com/errata/ELSA-2021-4326.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/</a><br><a href="https://lists.freedesktop.org/archives/xorg/">https://lists.freedesktop.org/archives/xorg/</a><br><a href="https://lists.x.org/archives/xorg-announce/2021-May/003088.html">https://lists.x.org/archives/xorg-announce/2021-May/003088.html</a><br><a href="https://security.gentoo.org/glsa/202105-16">https://security.gentoo.org/glsa/202105-16</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0001/">https://security.netapp.com/advisory/ntap-20210813-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4966-1">https://ubuntu.com/security/notices/USN-4966-1</a><br><a href="https://ubuntu.com/security/notices/USN-4966-2">https://ubuntu.com/security/notices/USN-4966-2</a><br><a href="https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/">https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/</a><br><a href="https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt">https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt</a><br><a href="https://www.debian.org/security/2021/dsa-4920">https://www.debian.org/security/2021/dsa-4920</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/2">https://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/3">https://www.openwall.com/lists/oss-security/2021/05/18/3</a><br></details> |
| libx11-data | CVE-2021-31535 | CRITICAL | 2:1.6.4-3+deb9u3 | 2:1.6.4-3+deb9u4 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html">http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html</a><br><a href="http://seclists.org/fulldisclosure/2021/May/52">http://seclists.org/fulldisclosure/2021/May/52</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/18/2">http://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-31535">https://access.redhat.com/security/cve/CVE-2021-31535</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535</a><br><a href="https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605">https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605</a><br><a href="https://linux.oracle.com/cve/CVE-2021-31535.html">https://linux.oracle.com/cve/CVE-2021-31535.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4326.html">https://linux.oracle.com/errata/ELSA-2021-4326.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/</a><br><a href="https://lists.freedesktop.org/archives/xorg/">https://lists.freedesktop.org/archives/xorg/</a><br><a href="https://lists.x.org/archives/xorg-announce/2021-May/003088.html">https://lists.x.org/archives/xorg-announce/2021-May/003088.html</a><br><a href="https://security.gentoo.org/glsa/202105-16">https://security.gentoo.org/glsa/202105-16</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0001/">https://security.netapp.com/advisory/ntap-20210813-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4966-1">https://ubuntu.com/security/notices/USN-4966-1</a><br><a href="https://ubuntu.com/security/notices/USN-4966-2">https://ubuntu.com/security/notices/USN-4966-2</a><br><a href="https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/">https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/</a><br><a href="https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt">https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt</a><br><a href="https://www.debian.org/security/2021/dsa-4920">https://www.debian.org/security/2021/dsa-4920</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/2">https://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/3">https://www.openwall.com/lists/oss-security/2021/05/18/3</a><br></details> |
| libx11-dev | CVE-2021-31535 | CRITICAL | 2:1.6.4-3+deb9u3 | 2:1.6.4-3+deb9u4 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html">http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html</a><br><a href="http://seclists.org/fulldisclosure/2021/May/52">http://seclists.org/fulldisclosure/2021/May/52</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/18/2">http://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-31535">https://access.redhat.com/security/cve/CVE-2021-31535</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535</a><br><a href="https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605">https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605</a><br><a href="https://linux.oracle.com/cve/CVE-2021-31535.html">https://linux.oracle.com/cve/CVE-2021-31535.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4326.html">https://linux.oracle.com/errata/ELSA-2021-4326.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/</a><br><a href="https://lists.freedesktop.org/archives/xorg/">https://lists.freedesktop.org/archives/xorg/</a><br><a href="https://lists.x.org/archives/xorg-announce/2021-May/003088.html">https://lists.x.org/archives/xorg-announce/2021-May/003088.html</a><br><a href="https://security.gentoo.org/glsa/202105-16">https://security.gentoo.org/glsa/202105-16</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0001/">https://security.netapp.com/advisory/ntap-20210813-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4966-1">https://ubuntu.com/security/notices/USN-4966-1</a><br><a href="https://ubuntu.com/security/notices/USN-4966-2">https://ubuntu.com/security/notices/USN-4966-2</a><br><a href="https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/">https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/</a><br><a href="https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt">https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt</a><br><a href="https://www.debian.org/security/2021/dsa-4920">https://www.debian.org/security/2021/dsa-4920</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/2">https://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/3">https://www.openwall.com/lists/oss-security/2021/05/18/3</a><br></details> |
| libxdot4 | CVE-2020-18032 | HIGH | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-18032">https://access.redhat.com/security/cve/CVE-2020-18032</a><br><a href="https://gitlab.com/graphviz/graphviz/-/issues/1700">https://gitlab.com/graphviz/graphviz/-/issues/1700</a><br><a href="https://linux.oracle.com/cve/CVE-2020-18032.html">https://linux.oracle.com/cve/CVE-2020-18032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4256.html">https://linux.oracle.com/errata/ELSA-2021-4256.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">https://nvd.nist.gov/vuln/detail/CVE-2020-18032</a><br><a href="https://www.debian.org/security/2021/dsa-4914">https://www.debian.org/security/2021/dsa-4914</a><br></details> |
| libxdot4 | CVE-2018-10196 | MEDIUM | 2.38.0-17 | 2.38.0-17+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-10196">https://access.redhat.com/security/cve/CVE-2018-10196</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1579254">https://bugzilla.redhat.com/show_bug.cgi?id=1579254</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1367">https://gitlab.com/graphviz/graphviz/issues/1367</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/</a><br><a href="https://ubuntu.com/security/notices/USN-5264-1">https://ubuntu.com/security/notices/USN-5264-1</a><br><a href="https://usn.ubuntu.com/3731-1/">https://usn.ubuntu.com/3731-1/</a><br></details> |
| libxdot4 | CVE-2019-11023 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11023">https://access.redhat.com/security/cve/CVE-2019-11023</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1517">https://gitlab.com/graphviz/graphviz/issues/1517</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/</a><br><a href="https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/">https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/</a><br></details> |
| libxdot4 | CVE-2019-9904 | LOW | 2.38.0-17 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9904">https://access.redhat.com/security/cve/CVE-2019-9904</a><br><a href="https://gitlab.com/graphviz/graphviz/issues/1512">https://gitlab.com/graphviz/graphviz/issues/1512</a><br><a href="https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/">https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/</a><br></details> |
| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://xmlsoft.org/news.html">http://xmlsoft.org/news.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16932">https://access.redhat.com/security/cve/CVE-2017-16932</a><br><a href="https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html">https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=759579">https://bugzilla.gnome.org/show_bug.cgi?id=759579</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932</a><br><a href="https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961">https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961</a><br><a href="https://github.com/sparklemotion/nokogiri/issues/1714">https://github.com/sparklemotion/nokogiri/issues/1714</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html">https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html</a><br><a href="https://ubuntu.com/security/notices/USN-3504-1">https://ubuntu.com/security/notices/USN-3504-1</a><br><a href="https://ubuntu.com/security/notices/USN-3504-2">https://ubuntu.com/security/notices/USN-3504-2</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/usn/usn-3504-1/">https://usn.ubuntu.com/usn/usn-3504-1/</a><br></details> |
| libxml2 | CVE-2017-5130 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.gnome.org/show_bug.cgi?id=783026">http://bugzilla.gnome.org/show_bug.cgi?id=783026</a><br><a href="http://www.securityfocus.com/bid/101482">http://www.securityfocus.com/bid/101482</a><br><a href="https://access.redhat.com/errata/RHSA-2017:2997">https://access.redhat.com/errata/RHSA-2017:2997</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5130">https://access.redhat.com/security/cve/CVE-2017-5130</a><br><a href="https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html</a><br><a href="https://crbug.com/722079">https://crbug.com/722079</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130</a><br><a href="https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed">https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/201710-24">https://security.gentoo.org/glsa/201710-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190719-0001/">https://security.netapp.com/advisory/ntap-20190719-0001/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br></details> |
| libxml2 | CVE-2021-3516 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3516">https://access.redhat.com/security/cve/CVE-2021-3516</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954225">https://bugzilla.redhat.com/show_bug.cgi?id=1954225</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539">https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/230">https://gitlab.gnome.org/GNOME/libxml2/-/issues/230</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3516.html">https://linux.oracle.com/cve/CVE-2021-3516.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210716-0005/">https://security.netapp.com/advisory/ntap-20210716-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libxml2 | CVE-2021-3517 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3517">https://access.redhat.com/security/cve/CVE-2021-3517</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954232">https://bugzilla.redhat.com/show_bug.cgi?id=1954232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2">https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/235">https://gitlab.gnome.org/GNOME/libxml2/-/issues/235</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3517.html">https://linux.oracle.com/cve/CVE-2021-3517.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">https://nvd.nist.gov/vuln/detail/CVE-2021-3517</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0004/">https://security.netapp.com/advisory/ntap-20211022-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libxml2 | CVE-2021-3518 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/55">http://seclists.org/fulldisclosure/2021/Jul/55</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/58">http://seclists.org/fulldisclosure/2021/Jul/58</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/59">http://seclists.org/fulldisclosure/2021/Jul/59</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3518">https://access.redhat.com/security/cve/CVE-2021-3518</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954242">https://bugzilla.redhat.com/show_bug.cgi?id=1954242</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7">https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/237">https://gitlab.gnome.org/GNOME/libxml2/-/issues/237</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3518.html">https://linux.oracle.com/cve/CVE-2021-3518.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">https://nvd.nist.gov/vuln/detail/CVE-2021-3518</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://support.apple.com/kb/HT212602">https://support.apple.com/kb/HT212602</a><br><a href="https://support.apple.com/kb/HT212604">https://support.apple.com/kb/HT212604</a><br><a href="https://support.apple.com/kb/HT212605">https://support.apple.com/kb/HT212605</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23308">https://access.redhat.com/security/cve/CVE-2022-23308</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308</a><br><a href="https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e">https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS">https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23308.html">https://linux.oracle.com/cve/CVE-2022-23308.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0899.html">https://linux.oracle.com/errata/ELSA-2022-0899.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">https://nvd.nist.gov/vuln/detail/CVE-2022-23308</a><br><a href="https://ubuntu.com/security/notices/USN-5324-1">https://ubuntu.com/security/notices/USN-5324-1</a><br></details> |
| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94347">http://www.securityfocus.com/bid/94347</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9318">https://access.redhat.com/security/cve/CVE-2016-9318</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=772726">https://bugzilla.gnome.org/show_bug.cgi?id=772726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318</a><br><a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://ubuntu.com/security/notices/USN-3739-2">https://ubuntu.com/security/notices/USN-3739-2</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a><br></details> |
| libxml2 | CVE-2017-5969 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/11/05/3">http://www.openwall.com/lists/oss-security/2016/11/05/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/13/1">http://www.openwall.com/lists/oss-security/2017/02/13/1</a><br><a href="http://www.securityfocus.com/bid/96188">http://www.securityfocus.com/bid/96188</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5969">https://access.redhat.com/security/cve/CVE-2017-5969</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=778519">https://bugzilla.gnome.org/show_bug.cgi?id=778519</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br></details> |
| libxml2 | CVE-2021-3537 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3537">https://access.redhat.com/security/cve/CVE-2021-3537</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956522">https://bugzilla.redhat.com/show_bug.cgi?id=1956522</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61">https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/243">https://gitlab.gnome.org/GNOME/libxml2/-/issues/243</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/244">https://gitlab.gnome.org/GNOME/libxml2/-/issues/244</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/245">https://gitlab.gnome.org/GNOME/libxml2/-/issues/245</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3537.html">https://linux.oracle.com/cve/CVE-2021-3537.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">https://nvd.nist.gov/vuln/detail/CVE-2021-3537</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libxml2 | CVE-2021-3541 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3541">https://access.redhat.com/security/cve/CVE-2021-3541</a><br><a href="https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/">https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1950515">https://bugzilla.redhat.com/show_bug.cgi?id=1950515</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e">https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)">https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3541.html">https://linux.oracle.com/cve/CVE-2021-3541.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210805-0007/">https://security.netapp.com/advisory/ntap-20210805-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libxml2-dev | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://xmlsoft.org/news.html">http://xmlsoft.org/news.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16932">https://access.redhat.com/security/cve/CVE-2017-16932</a><br><a href="https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html">https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=759579">https://bugzilla.gnome.org/show_bug.cgi?id=759579</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932</a><br><a href="https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961">https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961</a><br><a href="https://github.com/sparklemotion/nokogiri/issues/1714">https://github.com/sparklemotion/nokogiri/issues/1714</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html">https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html</a><br><a href="https://ubuntu.com/security/notices/USN-3504-1">https://ubuntu.com/security/notices/USN-3504-1</a><br><a href="https://ubuntu.com/security/notices/USN-3504-2">https://ubuntu.com/security/notices/USN-3504-2</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/usn/usn-3504-1/">https://usn.ubuntu.com/usn/usn-3504-1/</a><br></details> |
| libxml2-dev | CVE-2017-5130 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.gnome.org/show_bug.cgi?id=783026">http://bugzilla.gnome.org/show_bug.cgi?id=783026</a><br><a href="http://www.securityfocus.com/bid/101482">http://www.securityfocus.com/bid/101482</a><br><a href="https://access.redhat.com/errata/RHSA-2017:2997">https://access.redhat.com/errata/RHSA-2017:2997</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5130">https://access.redhat.com/security/cve/CVE-2017-5130</a><br><a href="https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html</a><br><a href="https://crbug.com/722079">https://crbug.com/722079</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130</a><br><a href="https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed">https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/201710-24">https://security.gentoo.org/glsa/201710-24</a><br><a href="https://security.netapp.com/advisory/ntap-20190719-0001/">https://security.netapp.com/advisory/ntap-20190719-0001/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br></details> |
| libxml2-dev | CVE-2021-3516 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3516">https://access.redhat.com/security/cve/CVE-2021-3516</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954225">https://bugzilla.redhat.com/show_bug.cgi?id=1954225</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539">https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/230">https://gitlab.gnome.org/GNOME/libxml2/-/issues/230</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3516.html">https://linux.oracle.com/cve/CVE-2021-3516.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210716-0005/">https://security.netapp.com/advisory/ntap-20210716-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libxml2-dev | CVE-2021-3517 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3517">https://access.redhat.com/security/cve/CVE-2021-3517</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954232">https://bugzilla.redhat.com/show_bug.cgi?id=1954232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2">https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/235">https://gitlab.gnome.org/GNOME/libxml2/-/issues/235</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3517.html">https://linux.oracle.com/cve/CVE-2021-3517.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">https://nvd.nist.gov/vuln/detail/CVE-2021-3517</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0004/">https://security.netapp.com/advisory/ntap-20211022-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libxml2-dev | CVE-2021-3518 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/55">http://seclists.org/fulldisclosure/2021/Jul/55</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/58">http://seclists.org/fulldisclosure/2021/Jul/58</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/59">http://seclists.org/fulldisclosure/2021/Jul/59</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3518">https://access.redhat.com/security/cve/CVE-2021-3518</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954242">https://bugzilla.redhat.com/show_bug.cgi?id=1954242</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7">https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/237">https://gitlab.gnome.org/GNOME/libxml2/-/issues/237</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3518.html">https://linux.oracle.com/cve/CVE-2021-3518.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">https://nvd.nist.gov/vuln/detail/CVE-2021-3518</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://support.apple.com/kb/HT212602">https://support.apple.com/kb/HT212602</a><br><a href="https://support.apple.com/kb/HT212604">https://support.apple.com/kb/HT212604</a><br><a href="https://support.apple.com/kb/HT212605">https://support.apple.com/kb/HT212605</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libxml2-dev | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23308">https://access.redhat.com/security/cve/CVE-2022-23308</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308</a><br><a href="https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e">https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS">https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23308.html">https://linux.oracle.com/cve/CVE-2022-23308.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0899.html">https://linux.oracle.com/errata/ELSA-2022-0899.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">https://nvd.nist.gov/vuln/detail/CVE-2022-23308</a><br><a href="https://ubuntu.com/security/notices/USN-5324-1">https://ubuntu.com/security/notices/USN-5324-1</a><br></details> |
| libxml2-dev | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94347">http://www.securityfocus.com/bid/94347</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9318">https://access.redhat.com/security/cve/CVE-2016-9318</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=772726">https://bugzilla.gnome.org/show_bug.cgi?id=772726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318</a><br><a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://ubuntu.com/security/notices/USN-3739-2">https://ubuntu.com/security/notices/USN-3739-2</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a><br></details> |
| libxml2-dev | CVE-2017-5969 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/11/05/3">http://www.openwall.com/lists/oss-security/2016/11/05/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/13/1">http://www.openwall.com/lists/oss-security/2017/02/13/1</a><br><a href="http://www.securityfocus.com/bid/96188">http://www.securityfocus.com/bid/96188</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-5969">https://access.redhat.com/security/cve/CVE-2017-5969</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=778519">https://bugzilla.gnome.org/show_bug.cgi?id=778519</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br></details> |
| libxml2-dev | CVE-2021-3537 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3537">https://access.redhat.com/security/cve/CVE-2021-3537</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956522">https://bugzilla.redhat.com/show_bug.cgi?id=1956522</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61">https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/243">https://gitlab.gnome.org/GNOME/libxml2/-/issues/243</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/244">https://gitlab.gnome.org/GNOME/libxml2/-/issues/244</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/245">https://gitlab.gnome.org/GNOME/libxml2/-/issues/245</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3537.html">https://linux.oracle.com/cve/CVE-2021-3537.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">https://nvd.nist.gov/vuln/detail/CVE-2021-3537</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libxml2-dev | CVE-2021-3541 | MEDIUM | 2.9.4+dfsg1-2.2+deb9u3 | 2.9.4+dfsg1-2.2+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3541">https://access.redhat.com/security/cve/CVE-2021-3541</a><br><a href="https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/">https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1950515">https://bugzilla.redhat.com/show_bug.cgi?id=1950515</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e">https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)">https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3541.html">https://linux.oracle.com/cve/CVE-2021-3541.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210805-0007/">https://security.netapp.com/advisory/ntap-20210805-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libxslt1-dev | CVE-2015-9019 | LOW | 1.1.29-2.1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2015-9019">https://access.redhat.com/security/cve/CVE-2015-9019</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=758400">https://bugzilla.gnome.org/show_bug.cgi?id=758400</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=934119">https://bugzilla.suse.com/show_bug.cgi?id=934119</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019</a><br></details> |
| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.29-2.1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2015-9019">https://access.redhat.com/security/cve/CVE-2015-9019</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=758400">https://bugzilla.gnome.org/show_bug.cgi?id=758400</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=934119">https://bugzilla.suse.com/show_bug.cgi?id=934119</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019</a><br></details> |
| linux-libc-dev | CVE-2021-39713 | CRITICAL | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39713">https://access.redhat.com/security/cve/CVE-2021-39713</a><br><a href="https://android.googlesource.com/kernel/common/+/3a7d0d07a3867">https://android.googlesource.com/kernel/common/+/3a7d0d07a3867</a><br><a href="https://android.googlesource.com/kernel/common/+/6f99528e97977">https://android.googlesource.com/kernel/common/+/6f99528e97977</a><br><a href="https://android.googlesource.com/kernel/common/+/86bd446b5cebd">https://android.googlesource.com/kernel/common/+/86bd446b5cebd</a><br><a href="https://android.googlesource.com/kernel/common/+/9d7e82cec35c0">https://android.googlesource.com/kernel/common/+/9d7e82cec35c0</a><br><a href="https://android.googlesource.com/kernel/common/+/e368fdb61d8e7">https://android.googlesource.com/kernel/common/+/e368fdb61d8e7</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713</a><br><a href="https://source.android.com/security/bulletin/pixel/2022-03-01">https://source.android.com/security/bulletin/pixel/2022-03-01</a><br></details> |
| linux-libc-dev | CVE-2013-7445 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-7445">https://access.redhat.com/security/cve/CVE-2013-7445</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=60533">https://bugzilla.kernel.org/show_bug.cgi?id=60533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445</a><br><a href="https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)">https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)</a><br></details> |
| linux-libc-dev | CVE-2018-12930 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104588">http://www.securityfocus.com/bid/104588</a><br><a href="https://access.redhat.com/errata/RHSA-2019:0641">https://access.redhat.com/errata/RHSA-2019:0641</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12930">https://access.redhat.com/security/cve/CVE-2018-12930</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403">https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930</a><br><a href="https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2">https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2</a><br></details> |
| linux-libc-dev | CVE-2018-12931 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104588">http://www.securityfocus.com/bid/104588</a><br><a href="https://access.redhat.com/errata/RHSA-2019:0641">https://access.redhat.com/errata/RHSA-2019:0641</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12931">https://access.redhat.com/security/cve/CVE-2018-12931</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403">https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931</a><br><a href="https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2">https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2</a><br></details> |
| linux-libc-dev | CVE-2018-25020 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html">http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25020">https://access.redhat.com/security/cve/CVE-2018-25020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25020">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25020</a><br><a href="https://git.kernel.org/linus/050fad7c4534c13c8eb1d9c2ba66012e014773cb (4.17-rc7)">https://git.kernel.org/linus/050fad7c4534c13c8eb1d9c2ba66012e014773cb (4.17-rc7)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb</a><br><a href="https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb">https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb</a><br><a href="https://security.netapp.com/advisory/ntap-20211229-0005/">https://security.netapp.com/advisory/ntap-20211229-0005/</a><br></details> |
| linux-libc-dev | CVE-2019-0145 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0145</a><br><a href="https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html">https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html</a><br><a href="https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/">https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html</a><br></details> |
| linux-libc-dev | CVE-2019-19377 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19377">https://access.redhat.com/security/cve/CVE-2019-19377</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19377.html">https://linux.oracle.com/cve/CVE-2019-19377.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5913.html">https://linux.oracle.com/errata/ELSA-2020-5913.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4367-1">https://ubuntu.com/security/notices/USN-4367-1</a><br><a href="https://ubuntu.com/security/notices/USN-4369-1">https://ubuntu.com/security/notices/USN-4369-1</a><br><a href="https://ubuntu.com/security/notices/USN-4414-1">https://ubuntu.com/security/notices/USN-4414-1</a><br><a href="https://usn.ubuntu.com/4367-1/">https://usn.ubuntu.com/4367-1/</a><br><a href="https://usn.ubuntu.com/4369-1/">https://usn.ubuntu.com/4369-1/</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19378 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19378">https://access.redhat.com/security/cve/CVE-2019-19378</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br></details> |
| linux-libc-dev | CVE-2019-19449 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19449">https://access.redhat.com/security/cve/CVE-2019-19449</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2019-19814 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19814">https://access.redhat.com/security/cve/CVE-2019-19814</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br></details> |
| linux-libc-dev | CVE-2019-19816 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19816">https://access.redhat.com/security/cve/CVE-2019-19816</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19816.html">https://linux.oracle.com/cve/CVE-2019-19816.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5995.html">https://linux.oracle.com/errata/ELSA-2020-5995.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4414-1">https://ubuntu.com/security/notices/USN-4414-1</a><br><a href="https://ubuntu.com/security/notices/USN-4708-1">https://ubuntu.com/security/notices/USN-4708-1</a><br><a href="https://ubuntu.com/security/notices/USN-4709-1">https://ubuntu.com/security/notices/USN-4709-1</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br></details> |
| linux-libc-dev | CVE-2019-2213 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2213</a><br><a href="https://lore.kernel.org/patchwork/patch/1087916/">https://lore.kernel.org/patchwork/patch/1087916/</a><br><a href="https://source.android.com/security/bulletin/2019-11-01">https://source.android.com/security/bulletin/2019-11-01</a><br></details> |
| linux-libc-dev | CVE-2020-0030 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-0030">https://access.redhat.com/security/cve/CVE-2020-0030</a><br><a href="https://source.android.com/security/bulletin/2020-02-01">https://source.android.com/security/bulletin/2020-02-01</a><br></details> |
| linux-libc-dev | CVE-2020-12362 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-12362">https://access.redhat.com/security/cve/CVE-2020-12362</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12362.html">https://linux.oracle.com/cve/CVE-2020-12362.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9434.html">https://linux.oracle.com/errata/ELSA-2021-9434.html</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html</a><br></details> |
| linux-libc-dev | CVE-2020-16119 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-16119">https://access.redhat.com/security/cve/CVE-2020-16119</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119</a><br><a href="https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695">https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695</a><br><a href="https://launchpad.net/bugs/1883840">https://launchpad.net/bugs/1883840</a><br><a href="https://linux.oracle.com/cve/CVE-2020-16119.html">https://linux.oracle.com/cve/CVE-2020-16119.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9487.html">https://linux.oracle.com/errata/ELSA-2021-9487.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/">https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0006/">https://security.netapp.com/advisory/ntap-20210304-0006/</a><br><a href="https://ubuntu.com/USN-4576-1">https://ubuntu.com/USN-4576-1</a><br><a href="https://ubuntu.com/USN-4577-1">https://ubuntu.com/USN-4577-1</a><br><a href="https://ubuntu.com/USN-4578-1">https://ubuntu.com/USN-4578-1</a><br><a href="https://ubuntu.com/USN-4579-1">https://ubuntu.com/USN-4579-1</a><br><a href="https://ubuntu.com/USN-4580-1">https://ubuntu.com/USN-4580-1</a><br><a href="https://ubuntu.com/security/notices/USN-4576-1">https://ubuntu.com/security/notices/USN-4576-1</a><br><a href="https://ubuntu.com/security/notices/USN-4577-1">https://ubuntu.com/security/notices/USN-4577-1</a><br><a href="https://ubuntu.com/security/notices/USN-4578-1">https://ubuntu.com/security/notices/USN-4578-1</a><br><a href="https://ubuntu.com/security/notices/USN-4579-1">https://ubuntu.com/security/notices/USN-4579-1</a><br><a href="https://ubuntu.com/security/notices/USN-4580-1">https://ubuntu.com/security/notices/USN-4580-1</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br><a href="https://www.openwall.com/lists/oss-security/2020/10/13/7">https://www.openwall.com/lists/oss-security/2020/10/13/7</a><br></details> |
| linux-libc-dev | CVE-2020-25670 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/01/1">http://www.openwall.com/lists/oss-security/2020/11/01/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/11/4">http://www.openwall.com/lists/oss-security/2021/05/11/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-25670">https://access.redhat.com/security/cve/CVE-2020-25670</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25670.html">https://linux.oracle.com/cve/CVE-2020-25670.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9410.html">https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4977-1">https://ubuntu.com/security/notices/USN-4977-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/01/1">https://www.openwall.com/lists/oss-security/2020/11/01/1</a><br></details> |
| linux-libc-dev | CVE-2020-25671 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/01/1">http://www.openwall.com/lists/oss-security/2020/11/01/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-25671">https://access.redhat.com/security/cve/CVE-2020-25671</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25671.html">https://linux.oracle.com/cve/CVE-2020-25671.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9410.html">https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4977-1">https://ubuntu.com/security/notices/USN-4977-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/01/1">https://www.openwall.com/lists/oss-security/2020/11/01/1</a><br></details> |
| linux-libc-dev | CVE-2020-25672 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/01/1">http://www.openwall.com/lists/oss-security/2020/11/01/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-25672">https://access.redhat.com/security/cve/CVE-2020-25672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25672.html">https://linux.oracle.com/cve/CVE-2020-25672.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9410.html">https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">https://nvd.nist.gov/vuln/detail/CVE-2020-25672</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4977-1">https://ubuntu.com/security/notices/USN-4977-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/01/1">https://www.openwall.com/lists/oss-security/2020/11/01/1</a><br></details> |
| linux-libc-dev | CVE-2020-27815 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/30/5">http://www.openwall.com/lists/oss-security/2020/11/30/5</a><br><a href="http://www.openwall.com/lists/oss-security/2020/12/28/1">http://www.openwall.com/lists/oss-security/2020/12/28/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-27815">https://access.redhat.com/security/cve/CVE-2020-27815</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1897668,">https://bugzilla.redhat.com/show_bug.cgi?id=1897668,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0004/">https://security.netapp.com/advisory/ntap-20210702-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4748-1">https://ubuntu.com/security/notices/USN-4748-1</a><br><a href="https://ubuntu.com/security/notices/USN-4749-1">https://ubuntu.com/security/notices/USN-4749-1</a><br><a href="https://ubuntu.com/security/notices/USN-4750-1">https://ubuntu.com/security/notices/USN-4750-1</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br><a href="https://ubuntu.com/security/notices/USN-4752-1">https://ubuntu.com/security/notices/USN-4752-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/30/5">https://www.openwall.com/lists/oss-security/2020/11/30/5</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/30/5,">https://www.openwall.com/lists/oss-security/2020/11/30/5,</a><br><a href="https://www.openwall.com/lists/oss-security/2020/12/28/1,">https://www.openwall.com/lists/oss-security/2020/12/28/1,</a><br></details> |
| linux-libc-dev | CVE-2020-28374 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html">http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/01/13/2">http://www.openwall.com/lists/oss-security/2021/01/13/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/01/13/5">http://www.openwall.com/lists/oss-security/2021/01/13/5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-28374">https://access.redhat.com/security/cve/CVE-2020-28374</a><br><a href="https://bugzilla.suse.com/attachment.cgi?id=844938">https://bugzilla.suse.com/attachment.cgi?id=844938</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1178372">https://bugzilla.suse.com/show_bug.cgi?id=1178372</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4</a><br><a href="https://github.com/open-iscsi/tcmu-runner/pull/644">https://github.com/open-iscsi/tcmu-runner/pull/644</a><br><a href="https://github.com/torvalds/linux/commit/2896c93811e39d63a4d9b63ccf12a8fbc226e5e4">https://github.com/torvalds/linux/commit/2896c93811e39d63a4d9b63ccf12a8fbc226e5e4</a><br><a href="https://linux.oracle.com/cve/CVE-2020-28374.html">https://linux.oracle.com/cve/CVE-2020-28374.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9307.html">https://linux.oracle.com/errata/ELSA-2021-9307.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZEUPID5DZYLZBIO4BEVLHFUDZZIFL57/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZEUPID5DZYLZBIO4BEVLHFUDZZIFL57/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HK7SRTITN5ABAUOOIGFVR7XE5YKYYAVO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HK7SRTITN5ABAUOOIGFVR7XE5YKYYAVO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTGQDYIEO2GOCOOKADBHEITF44GY55QF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTGQDYIEO2GOCOOKADBHEITF44GY55QF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">https://nvd.nist.gov/vuln/detail/CVE-2020-28374</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0002/">https://security.netapp.com/advisory/ntap-20210219-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4694-1">https://ubuntu.com/security/notices/USN-4694-1</a><br><a href="https://ubuntu.com/security/notices/USN-4709-1">https://ubuntu.com/security/notices/USN-4709-1</a><br><a href="https://ubuntu.com/security/notices/USN-4711-1">https://ubuntu.com/security/notices/USN-4711-1</a><br><a href="https://ubuntu.com/security/notices/USN-4713-1">https://ubuntu.com/security/notices/USN-4713-1</a><br><a href="https://ubuntu.com/security/notices/USN-4713-2">https://ubuntu.com/security/notices/USN-4713-2</a><br><a href="https://ubuntu.com/security/notices/USN-4753-1">https://ubuntu.com/security/notices/USN-4753-1</a><br><a href="https://ubuntu.com/security/notices/USN-4901-1">https://ubuntu.com/security/notices/USN-4901-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br></details> |
| linux-libc-dev | CVE-2020-29569 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569</a><br><a href="https://linux.oracle.com/cve/CVE-2020-29569.html">https://linux.oracle.com/cve/CVE-2020-29569.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9038.html">https://linux.oracle.com/errata/ELSA-2021-9038.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">https://nvd.nist.gov/vuln/detail/CVE-2020-29569</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0001/">https://security.netapp.com/advisory/ntap-20210205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4749-1">https://ubuntu.com/security/notices/USN-4749-1</a><br><a href="https://ubuntu.com/security/notices/USN-4750-1">https://ubuntu.com/security/notices/USN-4750-1</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br><a href="https://ubuntu.com/security/notices/USN-4876-1">https://ubuntu.com/security/notices/USN-4876-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br><a href="https://xenbits.xen.org/xsa/advisory-350.html">https://xenbits.xen.org/xsa/advisory-350.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-350.html">https://xenbits.xenproject.org/xsa/advisory-350.html</a><br></details> |
| linux-libc-dev | CVE-2020-29661 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html">http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html</a><br><a href="http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html">http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html</a><br><a href="http://www.openwall.com/lists/oss-security/2020/12/10/1">http://www.openwall.com/lists/oss-security/2020/12/10/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-29661">https://access.redhat.com/security/cve/CVE-2020-29661</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2125">https://bugs.chromium.org/p/project-zero/issues/detail?id=2125</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661</a><br><a href="https://git.kernel.org/linus/54ffccbf053b5b6ca4f6e45094b942fab92a25fc">https://git.kernel.org/linus/54ffccbf053b5b6ca4f6e45094b942fab92a25fc</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc</a><br><a href="https://linux.oracle.com/cve/CVE-2020-29661.html">https://linux.oracle.com/cve/CVE-2020-29661.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9212.html">https://linux.oracle.com/errata/ELSA-2021-9212.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">https://nvd.nist.gov/vuln/detail/CVE-2020-29661</a><br><a href="https://security.netapp.com/advisory/ntap-20210122-0001/">https://security.netapp.com/advisory/ntap-20210122-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4748-1">https://ubuntu.com/security/notices/USN-4748-1</a><br><a href="https://ubuntu.com/security/notices/USN-4749-1">https://ubuntu.com/security/notices/USN-4749-1</a><br><a href="https://ubuntu.com/security/notices/USN-4750-1">https://ubuntu.com/security/notices/USN-4750-1</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br><a href="https://ubuntu.com/security/notices/USN-4752-1">https://ubuntu.com/security/notices/USN-4752-1</a><br><a href="https://ubuntu.com/security/notices/USN-5130-1">https://ubuntu.com/security/notices/USN-5130-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| linux-libc-dev | CVE-2020-35519 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35519">https://access.redhat.com/security/cve/CVE-2020-35519</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1908251">https://bugzilla.redhat.com/show_bug.cgi?id=1908251</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35519">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35519</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ee50c8e262a0f0693dad264c3c99e30e6442a56">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ee50c8e262a0f0693dad264c3c99e30e6442a56</a><br><a href="https://seclists.org/oss-sec/2021/q1/228">https://seclists.org/oss-sec/2021/q1/228</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0009/">https://security.netapp.com/advisory/ntap-20210618-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4947-1">https://ubuntu.com/security/notices/USN-4947-1</a><br></details> |
| linux-libc-dev | CVE-2020-36385 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36385">https://access.redhat.com/security/cve/CVE-2020-36385</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385</a><br><a href="https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1">https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36385.html">https://linux.oracle.com/cve/CVE-2020-36385.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4777.html">https://linux.oracle.com/errata/ELSA-2021-4777.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210720-0004/">https://security.netapp.com/advisory/ntap-20210720-0004/</a><br><a href="https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2">https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2</a><br><a href="https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6">https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-0512 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-0512">https://access.redhat.com/security/cve/CVE-2021-0512</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512</a><br><a href="https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f">https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f</a><br><a href="https://linux.oracle.com/cve/CVE-2021-0512.html">https://linux.oracle.com/cve/CVE-2021-0512.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/">https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/</a><br><a href="https://source.android.com/security/bulletin/2021-06-01">https://source.android.com/security/bulletin/2021-06-01</a><br></details> |
| linux-libc-dev | CVE-2021-20322 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20322">https://access.redhat.com/security/cve/CVE-2021-20322</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2014230">https://bugzilla.redhat.com/show_bug.cgi?id=2014230</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&amp;id=4785305c05b25a242e5314cc821f54ade4c18810">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&amp;id=4785305c05b25a242e5314cc821f54ade4c18810</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&amp;id=6457378fe796815c973f631a1904e147d6ee33b1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&amp;id=6457378fe796815c973f631a1904e147d6ee33b1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&amp;id=67d6d681e15b578c1725bad8ad079e05d1c48a8e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&amp;id=67d6d681e15b578c1725bad8ad079e05d1c48a8e</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&amp;id=a00df2caffed3883c341d5685f830434312e4a43">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&amp;id=a00df2caffed3883c341d5685f830434312e4a43</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">https://nvd.nist.gov/vuln/detail/CVE-2021-20322</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0002/">https://security.netapp.com/advisory/ntap-20220303-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5268-1">https://ubuntu.com/security/notices/USN-5268-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-22543 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/06/26/1">http://www.openwall.com/lists/oss-security/2021/06/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22543">https://access.redhat.com/security/cve/CVE-2021-22543</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543</a><br><a href="https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584">https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584</a><br><a href="https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97">https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22543.html">https://linux.oracle.com/cve/CVE-2021-22543.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9453.html">https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/</a><br><a href="https://security.netapp.com/advisory/ntap-20210708-0002/">https://security.netapp.com/advisory/ntap-20210708-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5070-1">https://ubuntu.com/security/notices/USN-5070-1</a><br><a href="https://ubuntu.com/security/notices/USN-5071-1">https://ubuntu.com/security/notices/USN-5071-1</a><br><a href="https://ubuntu.com/security/notices/USN-5071-2">https://ubuntu.com/security/notices/USN-5071-2</a><br><a href="https://ubuntu.com/security/notices/USN-5071-3">https://ubuntu.com/security/notices/USN-5071-3</a><br><a href="https://ubuntu.com/security/notices/USN-5094-1">https://ubuntu.com/security/notices/USN-5094-1</a><br><a href="https://ubuntu.com/security/notices/USN-5094-2">https://ubuntu.com/security/notices/USN-5094-2</a><br><a href="https://ubuntu.com/security/notices/USN-5106-1">https://ubuntu.com/security/notices/USN-5106-1</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/26/3">https://www.openwall.com/lists/oss-security/2021/05/26/3</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/26/4">https://www.openwall.com/lists/oss-security/2021/05/26/4</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/26/5">https://www.openwall.com/lists/oss-security/2021/05/26/5</a><br></details> |
| linux-libc-dev | CVE-2021-22555 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html">http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html</a><br><a href="http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html">http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html</a><br><a href="http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html">http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html</a><br><a href="http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html">http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html</a><br><a href="http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html">http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22555">https://access.redhat.com/security/cve/CVE-2021-22555</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d</a><br><a href="https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528">https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22555.html">https://linux.oracle.com/cve/CVE-2021-22555.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9395.html">https://linux.oracle.com/errata/ELSA-2021-9395.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210805-0010/">https://security.netapp.com/advisory/ntap-20210805-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5039-1">https://ubuntu.com/security/notices/USN-5039-1</a><br></details> |
| linux-libc-dev | CVE-2021-23133 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/10/1">http://www.openwall.com/lists/oss-security/2021/05/10/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/10/2">http://www.openwall.com/lists/oss-security/2021/05/10/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/10/3">http://www.openwall.com/lists/oss-security/2021/05/10/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/10/4">http://www.openwall.com/lists/oss-security/2021/05/10/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23133">https://access.redhat.com/security/cve/CVE-2021-23133</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23133.html">https://linux.oracle.com/cve/CVE-2021-23133.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9363.html">https://linux.oracle.com/errata/ELSA-2021-9363.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">https://nvd.nist.gov/vuln/detail/CVE-2021-23133</a><br><a href="https://security.netapp.com/advisory/ntap-20210611-0008/">https://security.netapp.com/advisory/ntap-20210611-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5003-1">https://ubuntu.com/security/notices/USN-5003-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/04/18/2">https://www.openwall.com/lists/oss-security/2021/04/18/2</a><br></details> |
| linux-libc-dev | CVE-2021-23134 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23134">https://access.redhat.com/security/cve/CVE-2021-23134</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134</a><br><a href="https://git.kernel.org/linus/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6">https://git.kernel.org/linus/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23134.html">https://linux.oracle.com/cve/CVE-2021-23134.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9453.html">https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZYORWNQIHNWRFYRDXBWYWBYM46PDZEN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZYORWNQIHNWRFYRDXBWYWBYM46PDZEN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QALNQT4LJFVSSA3MWCIECVY4AFPP4X77/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QALNQT4LJFVSSA3MWCIECVY4AFPP4X77/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">https://nvd.nist.gov/vuln/detail/CVE-2021-23134</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0007/">https://security.netapp.com/advisory/ntap-20210625-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5016-1">https://ubuntu.com/security/notices/USN-5016-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/11/4">https://www.openwall.com/lists/oss-security/2021/05/11/4</a><br></details> |
| linux-libc-dev | CVE-2021-26930 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://xenbits.xen.org/xsa/advisory-365.html">http://xenbits.xen.org/xsa/advisory-365.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26930">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26930</a><br><a href="https://linux.oracle.com/cve/CVE-2021-26930.html">https://linux.oracle.com/cve/CVE-2021-26930.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9136.html">https://linux.oracle.com/errata/ELSA-2021-9136.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">https://nvd.nist.gov/vuln/detail/CVE-2021-26930</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0001/">https://security.netapp.com/advisory/ntap-20210326-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://ubuntu.com/security/notices/USN-4909-1">https://ubuntu.com/security/notices/USN-4909-1</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4949-1">https://ubuntu.com/security/notices/USN-4949-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/16/6">https://www.openwall.com/lists/oss-security/2021/02/16/6</a><br></details> |
| linux-libc-dev | CVE-2021-27364 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html">http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27364">https://access.redhat.com/security/cve/CVE-2021-27364</a><br><a href="https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html">https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1182717">https://bugzilla.suse.com/show_bug.cgi?id=1182717</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364</a><br><a href="https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa">https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa</a><br><a href="https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi">https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27364.html">https://linux.oracle.com/cve/CVE-2021-27364.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9212.html">https://linux.oracle.com/errata/ELSA-2021-9212.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">https://nvd.nist.gov/vuln/detail/CVE-2021-27364</a><br><a href="https://security.netapp.com/advisory/ntap-20210409-0001/">https://security.netapp.com/advisory/ntap-20210409-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4883-1">https://ubuntu.com/security/notices/USN-4883-1</a><br><a href="https://ubuntu.com/security/notices/USN-4887-1">https://ubuntu.com/security/notices/USN-4887-1</a><br><a href="https://ubuntu.com/security/notices/USN-4889-1">https://ubuntu.com/security/notices/USN-4889-1</a><br><a href="https://ubuntu.com/security/notices/USN-4901-1">https://ubuntu.com/security/notices/USN-4901-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/06/1">https://www.openwall.com/lists/oss-security/2021/03/06/1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| linux-libc-dev | CVE-2021-27365 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html">http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27365">https://access.redhat.com/security/cve/CVE-2021-27365</a><br><a href="https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html">https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1182715">https://bugzilla.suse.com/show_bug.cgi?id=1182715</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365</a><br><a href="https://git.kernel.org/linus/ec98ea7070e94cc25a422ec97d1421e28d97b7ee">https://git.kernel.org/linus/ec98ea7070e94cc25a422ec97d1421e28d97b7ee</a><br><a href="https://git.kernel.org/linus/f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5">https://git.kernel.org/linus/f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27365.html">https://linux.oracle.com/cve/CVE-2021-27365.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9212.html">https://linux.oracle.com/errata/ELSA-2021-9212.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">https://nvd.nist.gov/vuln/detail/CVE-2021-27365</a><br><a href="https://security.netapp.com/advisory/ntap-20210409-0001/">https://security.netapp.com/advisory/ntap-20210409-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4883-1">https://ubuntu.com/security/notices/USN-4883-1</a><br><a href="https://ubuntu.com/security/notices/USN-4887-1">https://ubuntu.com/security/notices/USN-4887-1</a><br><a href="https://ubuntu.com/security/notices/USN-4889-1">https://ubuntu.com/security/notices/USN-4889-1</a><br><a href="https://ubuntu.com/security/notices/USN-4901-1">https://ubuntu.com/security/notices/USN-4901-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/06/1">https://www.openwall.com/lists/oss-security/2021/03/06/1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| linux-libc-dev | CVE-2021-28660 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28660">https://access.redhat.com/security/cve/CVE-2021-28660</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">https://nvd.nist.gov/vuln/detail/CVE-2021-28660</a><br><a href="https://security.netapp.com/advisory/ntap-20210507-0008/">https://security.netapp.com/advisory/ntap-20210507-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-4945-1">https://ubuntu.com/security/notices/USN-4945-1</a><br><a href="https://ubuntu.com/security/notices/USN-4945-2">https://ubuntu.com/security/notices/USN-4945-2</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br></details> |
| linux-libc-dev | CVE-2021-29154 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html">http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-29154">https://access.redhat.com/security/cve/CVE-2021-29154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=26f55a59dc65ff77cd1c4b37991e26497fc68049">https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=26f55a59dc65ff77cd1c4b37991e26497fc68049</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=e4d4d456436bfb2fe412ee2cd489f7658449b098">https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=e4d4d456436bfb2fe412ee2cd489f7658449b098</a><br><a href="https://linux.oracle.com/cve/CVE-2021-29154.html">https://linux.oracle.com/cve/CVE-2021-29154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9307.html">https://linux.oracle.com/errata/ELSA-2021-9307.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/</a><br><a href="https://news.ycombinator.com/item?id=26757760">https://news.ycombinator.com/item?id=26757760</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">https://nvd.nist.gov/vuln/detail/CVE-2021-29154</a><br><a href="https://security.netapp.com/advisory/ntap-20210604-0006/">https://security.netapp.com/advisory/ntap-20210604-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4912-1">https://ubuntu.com/security/notices/USN-4912-1</a><br><a href="https://ubuntu.com/security/notices/USN-4916-1">https://ubuntu.com/security/notices/USN-4916-1</a><br><a href="https://ubuntu.com/security/notices/USN-4917-1">https://ubuntu.com/security/notices/USN-4917-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/04/08/1">https://www.openwall.com/lists/oss-security/2021/04/08/1</a><br></details> |
| linux-libc-dev | CVE-2021-32399 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/2">http://www.openwall.com/lists/oss-security/2021/05/11/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-32399">https://access.redhat.com/security/cve/CVE-2021-32399</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80</a><br><a href="https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80">https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32399.html">https://linux.oracle.com/cve/CVE-2021-32399.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9395.html">https://linux.oracle.com/errata/ELSA-2021-9395.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">https://nvd.nist.gov/vuln/detail/CVE-2021-32399</a><br><a href="https://security.netapp.com/advisory/ntap-20210622-0006/">https://security.netapp.com/advisory/ntap-20210622-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5016-1">https://ubuntu.com/security/notices/USN-5016-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/11/2">https://www.openwall.com/lists/oss-security/2021/05/11/2</a><br></details> |
| linux-libc-dev | CVE-2021-33033 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33033">https://access.redhat.com/security/cve/CVE-2021-33033</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033</a><br><a href="https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8">https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8</a><br><a href="https://git.kernel.org/linus/ad5d07f4a9cd671233ae20983848874731102c08">https://git.kernel.org/linus/ad5d07f4a9cd671233ae20983848874731102c08</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33033.html">https://linux.oracle.com/cve/CVE-2021-33033.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9363.html">https://linux.oracle.com/errata/ELSA-2021-9363.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">https://nvd.nist.gov/vuln/detail/CVE-2021-33033</a><br><a href="https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-cipso_v4_genopt">https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-cipso_v4_genopt</a><br><a href="https://syzkaller.appspot.com/bug?id=96e7d345748d8814901c91cd92084ed04b46701e">https://syzkaller.appspot.com/bug?id=96e7d345748d8814901c91cd92084ed04b46701e</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-33034 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33034">https://access.redhat.com/security/cve/CVE-2021-33034</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034</a><br><a href="https://git.kernel.org/linus/5c4c8c9544099bb9043a10a5318130a943e32fc3">https://git.kernel.org/linus/5c4c8c9544099bb9043a10a5318130a943e32fc3</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33034.html">https://linux.oracle.com/cve/CVE-2021-33034.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9363.html">https://linux.oracle.com/errata/ELSA-2021-9363.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">https://nvd.nist.gov/vuln/detail/CVE-2021-33034</a><br><a href="https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl">https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl</a><br><a href="https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1">https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5016-1">https://ubuntu.com/security/notices/USN-5016-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-3347 | HIGH | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/29/4">http://www.openwall.com/lists/oss-security/2021/01/29/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/01/29/5">http://www.openwall.com/lists/oss-security/2021/01/29/5</a><br><a href="http://www.openwall.com/lists/oss-security/2021/02/01/4">http://www.openwall.com/lists/oss-security/2021/02/01/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3347">https://access.redhat.com/security/cve/CVE-2021-3347</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3347.html">https://linux.oracle.com/cve/CVE-2021-3347.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9434.html">https://linux.oracle.com/errata/ELSA-2021-9434.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">https://nvd.nist.gov/vuln/detail/CVE-2021-3347</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0005/">https://security.netapp.com/advisory/ntap-20210304-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-4878-1">https://ubuntu.com/security/notices/USN-4878-1</a><br><a href="https://ubuntu.com/security/notices/USN-4884-1">https://ubuntu.com/security/notices/USN-4884-1</a><br><a href="https://ubuntu.com/security/notices/USN-4907-1">https://ubuntu.com/security/notices/USN-4907-1</a><br><a href="https://ubuntu.com/security/notices/USN-4910-1">https://ubuntu.com/security/notices/USN-4910-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br><a href="https://www.openwall.com/lists/oss-security/2021/01/29/1">https://www.openwall.com/lists/oss-security/2021/01/29/1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/01/29/3">https://www.openwall.com/lists/oss-security/2021/01/29/3</a><br></details> |
| linux-libc-dev | CVE-2021-33909 | HIGH | 4.9.246-2 | 4.9.272-2 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html">http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href="http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html">http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html</a><br><a href="http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html">http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html</a><br><a href="http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html">http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/07/22/7">http://www.openwall.com/lists/oss-security/2021/07/22/7</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/25/10">http://www.openwall.com/lists/oss-security/2021/08/25/10</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/17/2">http://www.openwall.com/lists/oss-security/2021/09/17/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/17/4">http://www.openwall.com/lists/oss-security/2021/09/17/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/21/1">http://www.openwall.com/lists/oss-security/2021/09/21/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33909">https://access.redhat.com/security/cve/CVE-2021-33909</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b</a><br><a href="https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b">https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33909.html">https://linux.oracle.com/cve/CVE-2021-33909.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9410.html">https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">https://nvd.nist.gov/vuln/detail/CVE-2021-33909</a><br><a href="https://security.netapp.com/advisory/ntap-20210819-0004/">https://security.netapp.com/advisory/ntap-20210819-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-5014-1">https://ubuntu.com/security/notices/USN-5014-1</a><br><a href="https://ubuntu.com/security/notices/USN-5015-1">https://ubuntu.com/security/notices/USN-5015-1</a><br><a href="https://ubuntu.com/security/notices/USN-5016-1">https://ubuntu.com/security/notices/USN-5016-1</a><br><a href="https://ubuntu.com/security/notices/USN-5017-1">https://ubuntu.com/security/notices/USN-5017-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://www.debian.org/security/2021/dsa-4941">https://www.debian.org/security/2021/dsa-4941</a><br><a href="https://www.openwall.com/lists/oss-security/2021/07/20/1">https://www.openwall.com/lists/oss-security/2021/07/20/1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt">https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt</a><br></details> |
| linux-libc-dev | CVE-2021-3483 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/04/07/1">http://www.openwall.com/lists/oss-security/2021/04/07/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3483">https://access.redhat.com/security/cve/CVE-2021-3483</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1948045">https://bugzilla.redhat.com/show_bug.cgi?id=1948045</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483</a><br><a href="https://git.kernel.org/linus/829933ef05a951c8ff140e814656d73e74915fa">https://git.kernel.org/linus/829933ef05a951c8ff140e814656d73e74915fa</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">https://nvd.nist.gov/vuln/detail/CVE-2021-3483</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0002/">https://security.netapp.com/advisory/ntap-20210629-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/04/07/1">https://www.openwall.com/lists/oss-security/2021/04/07/1</a><br></details> |
| linux-libc-dev | CVE-2021-34981 | HIGH | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-34981">https://access.redhat.com/security/cve/CVE-2021-34981</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981</a><br><a href="https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)">https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479</a><br><a href="https://www.zerodayinitiative.com/advisories/ZDI-21-1223/">https://www.zerodayinitiative.com/advisories/ZDI-21-1223/</a><br></details> |
| linux-libc-dev | CVE-2021-3506 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/08/1">http://www.openwall.com/lists/oss-security/2021/05/08/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3506">https://access.redhat.com/security/cve/CVE-2021-3506</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1944298">https://bugzilla.redhat.com/show_bug.cgi?id=1944298</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3506">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3506</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lore.kernel.org/lkml/20210322114730.71103-1-yuchao0@huawei.com/">https://lore.kernel.org/lkml/20210322114730.71103-1-yuchao0@huawei.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3506">https://nvd.nist.gov/vuln/detail/CVE-2021-3506</a><br><a href="https://security.netapp.com/advisory/ntap-20210611-0007/">https://security.netapp.com/advisory/ntap-20210611-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5016-1">https://ubuntu.com/security/notices/USN-5016-1</a><br><a href="https://ubuntu.com/security/notices/USN-5339-1">https://ubuntu.com/security/notices/USN-5339-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2520013.html">https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2520013.html</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/28/2">https://www.openwall.com/lists/oss-security/2021/03/28/2</a><br></details> |
| linux-libc-dev | CVE-2021-3600 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3600">https://access.redhat.com/security/cve/CVE-2021-3600</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600</a><br><a href="https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90">https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3600.html">https://linux.oracle.com/cve/CVE-2021-3600.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4356.html">https://linux.oracle.com/errata/ELSA-2021-4356.html</a><br><a href="https://lore.kernel.org/patchwork/patch/1379497/">https://lore.kernel.org/patchwork/patch/1379497/</a><br><a href="https://ubuntu.com/security/notices/USN-5003-1">https://ubuntu.com/security/notices/USN-5003-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/06/23/1">https://www.openwall.com/lists/oss-security/2021/06/23/1</a><br></details> |
| linux-libc-dev | CVE-2021-3609 | HIGH | 4.9.246-2 | 4.9.272-2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3609">https://access.redhat.com/security/cve/CVE-2021-3609</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1971651">https://bugzilla.redhat.com/show_bug.cgi?id=1971651</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609</a><br><a href="https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md">https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md</a><br><a href="https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463">https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3609.html">https://linux.oracle.com/cve/CVE-2021-3609.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9453.html">https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href="https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t">https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t</a><br><a href="https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u">https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">https://nvd.nist.gov/vuln/detail/CVE-2021-3609</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5002-1">https://ubuntu.com/security/notices/USN-5002-1</a><br><a href="https://ubuntu.com/security/notices/USN-5003-1">https://ubuntu.com/security/notices/USN-5003-1</a><br><a href="https://ubuntu.com/security/notices/USN-5082-1">https://ubuntu.com/security/notices/USN-5082-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/06/19/1">https://www.openwall.com/lists/oss-security/2021/06/19/1</a><br></details> |
| linux-libc-dev | CVE-2021-3612 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3612">https://access.redhat.com/security/cve/CVE-2021-3612</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1974079">https://bugzilla.redhat.com/show_bug.cgi?id=1974079</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3612.html">https://linux.oracle.com/cve/CVE-2021-3612.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9453.html">https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/</a><br><a href="https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/">https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/</a><br><a href="https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u">https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u</a><br><a href="https://security.netapp.com/advisory/ntap-20210805-0005/">https://security.netapp.com/advisory/ntap-20210805-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5070-1">https://ubuntu.com/security/notices/USN-5070-1</a><br><a href="https://ubuntu.com/security/notices/USN-5071-1">https://ubuntu.com/security/notices/USN-5071-1</a><br><a href="https://ubuntu.com/security/notices/USN-5071-2">https://ubuntu.com/security/notices/USN-5071-2</a><br><a href="https://ubuntu.com/security/notices/USN-5071-3">https://ubuntu.com/security/notices/USN-5071-3</a><br><a href="https://ubuntu.com/security/notices/USN-5073-1">https://ubuntu.com/security/notices/USN-5073-1</a><br><a href="https://ubuntu.com/security/notices/USN-5073-2">https://ubuntu.com/security/notices/USN-5073-2</a><br><a href="https://ubuntu.com/security/notices/USN-5073-3">https://ubuntu.com/security/notices/USN-5073-3</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5106-1">https://ubuntu.com/security/notices/USN-5106-1</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-3640 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3640">https://access.redhat.com/security/cve/CVE-2021-3640</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1980646">https://bugzilla.redhat.com/show_bug.cgi?id=1980646</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951">https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&amp;id=99c23da0eed4fd20cae8243f2b51e10e66aa0951">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&amp;id=99c23da0eed4fd20cae8243f2b51e10e66aa0951</a><br><a href="https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951">https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3640.html">https://linux.oracle.com/cve/CVE-2021-3640.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9148.html">https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lkml.org/lkml/2021/8/28/238">https://lkml.org/lkml/2021/8/28/238</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">https://nvd.nist.gov/vuln/detail/CVE-2021-3640</a><br><a href="https://ubuntu.com/security/CVE-2021-3640">https://ubuntu.com/security/CVE-2021-3640</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://ubuntu.com/security/notices/USN-5267-1">https://ubuntu.com/security/notices/USN-5267-1</a><br><a href="https://ubuntu.com/security/notices/USN-5267-3">https://ubuntu.com/security/notices/USN-5267-3</a><br><a href="https://ubuntu.com/security/notices/USN-5268-1">https://ubuntu.com/security/notices/USN-5268-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2021/07/22/1">https://www.openwall.com/lists/oss-security/2021/07/22/1</a><br><a href="https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/">https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/</a><br><a href="https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/">https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/</a><br><a href="https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/">https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/</a><br></details> |
| linux-libc-dev | CVE-2021-3653 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html">http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3653">https://access.redhat.com/security/cve/CVE-2021-3653</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1983686">https://bugzilla.redhat.com/show_bug.cgi?id=1983686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653</a><br><a href="https://github.com/torvalds/linux/commit/3d6368ef580a">https://github.com/torvalds/linux/commit/3d6368ef580a</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3653.html">https://linux.oracle.com/cve/CVE-2021-3653.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9245.html">https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">https://nvd.nist.gov/vuln/detail/CVE-2021-3653</a><br><a href="https://ubuntu.com/security/notices/USN-5062-1">https://ubuntu.com/security/notices/USN-5062-1</a><br><a href="https://ubuntu.com/security/notices/USN-5070-1">https://ubuntu.com/security/notices/USN-5070-1</a><br><a href="https://ubuntu.com/security/notices/USN-5071-1">https://ubuntu.com/security/notices/USN-5071-1</a><br><a href="https://ubuntu.com/security/notices/USN-5071-2">https://ubuntu.com/security/notices/USN-5071-2</a><br><a href="https://ubuntu.com/security/notices/USN-5072-1">https://ubuntu.com/security/notices/USN-5072-1</a><br><a href="https://ubuntu.com/security/notices/USN-5073-1">https://ubuntu.com/security/notices/USN-5073-1</a><br><a href="https://ubuntu.com/security/notices/USN-5073-2">https://ubuntu.com/security/notices/USN-5073-2</a><br><a href="https://ubuntu.com/security/notices/USN-5082-1">https://ubuntu.com/security/notices/USN-5082-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/08/16/1">https://www.openwall.com/lists/oss-security/2021/08/16/1</a><br></details> |
| linux-libc-dev | CVE-2021-3752 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3752">https://access.redhat.com/security/cve/CVE-2021-3752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1999544">https://bugzilla.redhat.com/show_bug.cgi?id=1999544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3752.html">https://linux.oracle.com/cve/CVE-2021-3752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9148.html">https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/">https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">https://nvd.nist.gov/vuln/detail/CVE-2021-3752</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0009/">https://security.netapp.com/advisory/ntap-20220318-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://ubuntu.com/security/notices/USN-5267-1">https://ubuntu.com/security/notices/USN-5267-1</a><br><a href="https://ubuntu.com/security/notices/USN-5267-3">https://ubuntu.com/security/notices/USN-5267-3</a><br><a href="https://ubuntu.com/security/notices/USN-5268-1">https://ubuntu.com/security/notices/USN-5268-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2021/09/15/4">https://www.openwall.com/lists/oss-security/2021/09/15/4</a><br></details> |
| linux-libc-dev | CVE-2021-37576 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/27/2">http://www.openwall.com/lists/oss-security/2021/07/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37576">https://access.redhat.com/security/cve/CVE-2021-37576</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576</a><br><a href="https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)">https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37576.html">https://linux.oracle.com/cve/CVE-2021-37576.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3801.html">https://linux.oracle.com/errata/ELSA-2021-3801.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/</a><br><a href="https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u">https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">https://nvd.nist.gov/vuln/detail/CVE-2021-37576</a><br><a href="https://security.netapp.com/advisory/ntap-20210917-0005/">https://security.netapp.com/advisory/ntap-20210917-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5091-1">https://ubuntu.com/security/notices/USN-5091-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5094-1">https://ubuntu.com/security/notices/USN-5094-1</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br><a href="https://www.openwall.com/lists/oss-security/2021/07/26/1">https://www.openwall.com/lists/oss-security/2021/07/26/1</a><br></details> |
| linux-libc-dev | CVE-2021-3760 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3760">https://access.redhat.com/security/cve/CVE-2021-3760</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2000585">https://bugzilla.redhat.com/show_bug.cgi?id=2000585</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0007/">https://security.netapp.com/advisory/ntap-20220318-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-5139-1">https://ubuntu.com/security/notices/USN-5139-1</a><br><a href="https://ubuntu.com/security/notices/USN-5165-1">https://ubuntu.com/security/notices/USN-5165-1</a><br><a href="https://ubuntu.com/security/notices/USN-5208-1">https://ubuntu.com/security/notices/USN-5208-1</a><br><a href="https://ubuntu.com/security/notices/USN-5209-1">https://ubuntu.com/security/notices/USN-5209-1</a><br><a href="https://ubuntu.com/security/notices/USN-5210-1">https://ubuntu.com/security/notices/USN-5210-1</a><br><a href="https://ubuntu.com/security/notices/USN-5218-1">https://ubuntu.com/security/notices/USN-5218-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2021/10/26/2">https://www.openwall.com/lists/oss-security/2021/10/26/2</a><br></details> |
| linux-libc-dev | CVE-2021-38160 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38160">https://access.redhat.com/security/cve/CVE-2021-38160</a><br><a href="https://access.redhat.com/security/cve/cve-2021-38160">https://access.redhat.com/security/cve/cve-2021-38160</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160</a><br><a href="https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46">https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46</a><br><a href="https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46">https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46</a><br><a href="https://linux.oracle.com/cve/CVE-2021-38160.html">https://linux.oracle.com/cve/CVE-2021-38160.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9488.html">https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">https://nvd.nist.gov/vuln/detail/CVE-2021-38160</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0010/">https://security.netapp.com/advisory/ntap-20210902-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5073-1">https://ubuntu.com/security/notices/USN-5073-1</a><br><a href="https://ubuntu.com/security/notices/USN-5073-2">https://ubuntu.com/security/notices/USN-5073-2</a><br><a href="https://ubuntu.com/security/notices/USN-5073-3">https://ubuntu.com/security/notices/USN-5073-3</a><br><a href="https://ubuntu.com/security/notices/USN-5091-1">https://ubuntu.com/security/notices/USN-5091-1</a><br><a href="https://ubuntu.com/security/notices/USN-5091-2">https://ubuntu.com/security/notices/USN-5091-2</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5106-1">https://ubuntu.com/security/notices/USN-5106-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br></details> |
| linux-libc-dev | CVE-2021-38207 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38207">https://access.redhat.com/security/cve/CVE-2021-38207</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207</a><br><a href="https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d">https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38207">https://nvd.nist.gov/vuln/detail/CVE-2021-38207</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0007/">https://security.netapp.com/advisory/ntap-20210902-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-5070-1">https://ubuntu.com/security/notices/USN-5070-1</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br></details> |
| linux-libc-dev | CVE-2021-38300 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/09/15/5">http://www.openwall.com/lists/oss-security/2021/09/15/5</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-38300">https://access.redhat.com/security/cve/CVE-2021-38300</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/bpf/20210915160437.4080-1-piotras@gmail.com/">https://lore.kernel.org/bpf/20210915160437.4080-1-piotras@gmail.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">https://nvd.nist.gov/vuln/detail/CVE-2021-38300</a><br><a href="https://security.netapp.com/advisory/ntap-20211008-0003/">https://security.netapp.com/advisory/ntap-20211008-0003/</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2021/09/15/5">https://www.openwall.com/lists/oss-security/2021/09/15/5</a><br></details> |
| linux-libc-dev | CVE-2021-3864 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3864">https://access.redhat.com/security/cve/CVE-2021-3864</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864</a><br><a href="https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com">https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com</a><br><a href="https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/">https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/</a><br><a href="https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com">https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com</a><br><a href="https://www.openwall.com/lists/oss-security/2021/10/20/2">https://www.openwall.com/lists/oss-security/2021/10/20/2</a><br></details> |
| linux-libc-dev | CVE-2021-39685 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39685">https://access.redhat.com/security/cve/CVE-2021-39685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&amp;id=36dfdf11af49d3c009c711fb16f5c6e7a274505d">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&amp;id=36dfdf11af49d3c009c711fb16f5c6e7a274505d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&amp;id=6eea4ace62fa6414432692ee44f0c0a3d541d97a">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&amp;id=6eea4ace62fa6414432692ee44f0c0a3d541d97a</a><br><a href="https://github.com/szymonh/inspector-gadget">https://github.com/szymonh/inspector-gadget</a><br><a href="https://gitlab.com/postmarketOS/pmaports/-/issues/1346">https://gitlab.com/postmarketOS/pmaports/-/issues/1346</a><br><a href="https://linux.oracle.com/cve/CVE-2021-39685.html">https://linux.oracle.com/cve/CVE-2021-39685.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9245.html">https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href="https://source.android.com/security/bulletin/2022-03-01">https://source.android.com/security/bulletin/2022-03-01</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-2">https://ubuntu.com/security/notices/USN-5294-2</a><br><a href="https://ubuntu.com/security/notices/USN-5297-1">https://ubuntu.com/security/notices/USN-5297-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/12/15/4">https://www.openwall.com/lists/oss-security/2021/12/15/4</a><br></details> |
| linux-libc-dev | CVE-2021-39686 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39686">https://access.redhat.com/security/cve/CVE-2021-39686</a><br><a href="https://android.googlesource.com/kernel/common/+/11db2de0af2a">https://android.googlesource.com/kernel/common/+/11db2de0af2a</a><br><a href="https://android.googlesource.com/kernel/common/+/3af7a2f61023">https://android.googlesource.com/kernel/common/+/3af7a2f61023</a><br><a href="https://android.googlesource.com/kernel/common/+/a4eacf3227bd">https://android.googlesource.com/kernel/common/+/a4eacf3227bd</a><br><a href="https://android.googlesource.com/kernel/common/+/d49297739550">https://android.googlesource.com/kernel/common/+/d49297739550</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686</a><br><a href="https://source.android.com/security/bulletin/2022-03-01">https://source.android.com/security/bulletin/2022-03-01</a><br></details> |
| linux-libc-dev | CVE-2021-39698 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39698">https://access.redhat.com/security/cve/CVE-2021-39698</a><br><a href="https://android.googlesource.com/kernel/common/+/363bee27e258">https://android.googlesource.com/kernel/common/+/363bee27e258</a><br><a href="https://android.googlesource.com/kernel/common/+/42288cb44c4b">https://android.googlesource.com/kernel/common/+/42288cb44c4b</a><br><a href="https://android.googlesource.com/kernel/common/+/50252e4b5e98">https://android.googlesource.com/kernel/common/+/50252e4b5e98</a><br><a href="https://android.googlesource.com/kernel/common/+/9537bae0da1f">https://android.googlesource.com/kernel/common/+/9537bae0da1f</a><br><a href="https://android.googlesource.com/kernel/common/+/a880b28a71e3">https://android.googlesource.com/kernel/common/+/a880b28a71e3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698</a><br><a href="https://lore.kernel.org/all/20211209010455.42744-2-ebiggers@kernel.org/">https://lore.kernel.org/all/20211209010455.42744-2-ebiggers@kernel.org/</a><br><a href="https://lore.kernel.org/all/20211210235312.40412-5-ebiggers@kernel.org/">https://lore.kernel.org/all/20211210235312.40412-5-ebiggers@kernel.org/</a><br><a href="https://source.android.com/security/bulletin/2022-03-01">https://source.android.com/security/bulletin/2022-03-01</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br></details> |
| linux-libc-dev | CVE-2021-39714 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://source.android.com/security/bulletin/pixel/2022-03-01">https://source.android.com/security/bulletin/pixel/2022-03-01</a><br></details> |
| linux-libc-dev | CVE-2021-40490 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-40490">https://access.redhat.com/security/cve/CVE-2021-40490</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa">https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa</a><br><a href="https://linux.oracle.com/cve/CVE-2021-40490.html">https://linux.oracle.com/cve/CVE-2021-40490.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9488.html">https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/</a><br><a href="https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/">https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">https://nvd.nist.gov/vuln/detail/CVE-2021-40490</a><br><a href="https://security.netapp.com/advisory/ntap-20211004-0001/">https://security.netapp.com/advisory/ntap-20211004-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5113-1">https://ubuntu.com/security/notices/USN-5113-1</a><br><a href="https://ubuntu.com/security/notices/USN-5114-1">https://ubuntu.com/security/notices/USN-5114-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-1">https://ubuntu.com/security/notices/USN-5116-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-2">https://ubuntu.com/security/notices/USN-5116-2</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br></details> |
| linux-libc-dev | CVE-2021-4083 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4083">https://access.redhat.com/security/cve/CVE-2021-4083</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2029923">https://bugzilla.redhat.com/show_bug.cgi?id=2029923</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083</a><br><a href="https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)">https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">https://nvd.nist.gov/vuln/detail/CVE-2021-4083</a><br><a href="https://security.netapp.com/advisory/ntap-20220217-0005/">https://security.netapp.com/advisory/ntap-20220217-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-2">https://ubuntu.com/security/notices/USN-5294-2</a><br><a href="https://ubuntu.com/security/notices/USN-5295-1">https://ubuntu.com/security/notices/USN-5295-1</a><br><a href="https://ubuntu.com/security/notices/USN-5295-2">https://ubuntu.com/security/notices/USN-5295-2</a><br><a href="https://ubuntu.com/security/notices/USN-5297-1">https://ubuntu.com/security/notices/USN-5297-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-41864 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41864">https://access.redhat.com/security/cve/CVE-2021-41864</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a">https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a</a><br><a href="https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a">https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41864.html">https://linux.oracle.com/cve/CVE-2021-41864.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9623.html">https://linux.oracle.com/errata/ELSA-2021-9623.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">https://nvd.nist.gov/vuln/detail/CVE-2021-41864</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0004/">https://security.netapp.com/advisory/ntap-20211029-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-5139-1">https://ubuntu.com/security/notices/USN-5139-1</a><br><a href="https://ubuntu.com/security/notices/USN-5140-1">https://ubuntu.com/security/notices/USN-5140-1</a><br><a href="https://ubuntu.com/security/notices/USN-5208-1">https://ubuntu.com/security/notices/USN-5208-1</a><br><a href="https://ubuntu.com/security/notices/USN-5209-1">https://ubuntu.com/security/notices/USN-5209-1</a><br><a href="https://ubuntu.com/security/notices/USN-5210-1">https://ubuntu.com/security/notices/USN-5210-1</a><br><a href="https://ubuntu.com/security/notices/USN-5218-1">https://ubuntu.com/security/notices/USN-5218-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-4197 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4197">https://access.redhat.com/security/cve/CVE-2021-4197</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2035652">https://bugzilla.redhat.com/show_bug.cgi?id=2035652</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197</a><br><a href="https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/">https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br></details> |
| linux-libc-dev | CVE-2021-42008 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42008">https://access.redhat.com/security/cve/CVE-2021-42008</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008</a><br><a href="https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)">https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">https://nvd.nist.gov/vuln/detail/CVE-2021-42008</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0002/">https://security.netapp.com/advisory/ntap-20211104-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5113-1">https://ubuntu.com/security/notices/USN-5113-1</a><br><a href="https://ubuntu.com/security/notices/USN-5114-1">https://ubuntu.com/security/notices/USN-5114-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-1">https://ubuntu.com/security/notices/USN-5116-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-2">https://ubuntu.com/security/notices/USN-5116-2</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.youtube.com/watch?v=d5f9xLK8Vhw">https://www.youtube.com/watch?v=d5f9xLK8Vhw</a><br></details> |
| linux-libc-dev | CVE-2021-4202 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4202">https://access.redhat.com/security/cve/CVE-2021-4202</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036682">https://bugzilla.redhat.com/show_bug.cgi?id=2036682</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-2">https://ubuntu.com/security/notices/USN-5294-2</a><br><a href="https://ubuntu.com/security/notices/USN-5297-1">https://ubuntu.com/security/notices/USN-5297-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br></details> |
| linux-libc-dev | CVE-2021-45469 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/12/25/1">http://www.openwall.com/lists/oss-security/2021/12/25/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-45469">https://access.redhat.com/security/cve/CVE-2021-45469</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=215235">https://bugzilla.kernel.org/show_bug.cgi?id=215235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&amp;id=5598b24efaf4892741c798b425d543e4bed357a1">https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&amp;id=5598b24efaf4892741c798b425d543e4bed357a1</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45469">https://nvd.nist.gov/vuln/detail/CVE-2021-45469</a><br><a href="https://security.netapp.com/advisory/ntap-20220114-0003/">https://security.netapp.com/advisory/ntap-20220114-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-45485 | HIGH | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45485">https://access.redhat.com/security/cve/CVE-2021-45485</a><br><a href="https://arxiv.org/pdf/2112.09604.pdf">https://arxiv.org/pdf/2112.09604.pdf</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485</a><br><a href="https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)">https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99</a><br><a href="https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/">https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">https://nvd.nist.gov/vuln/detail/CVE-2021-45485</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0001/">https://security.netapp.com/advisory/ntap-20220121-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2022-0330 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0330">https://access.redhat.com/security/cve/CVE-2022-0330</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2042404">https://bugzilla.redhat.com/show_bug.cgi?id=2042404</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330</a><br><a href="https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c">https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0330.html">https://linux.oracle.com/cve/CVE-2022-0330.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9245.html">https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-2">https://ubuntu.com/security/notices/USN-5294-2</a><br><a href="https://ubuntu.com/security/notices/USN-5295-1">https://ubuntu.com/security/notices/USN-5295-1</a><br><a href="https://ubuntu.com/security/notices/USN-5295-2">https://ubuntu.com/security/notices/USN-5295-2</a><br><a href="https://ubuntu.com/security/notices/USN-5297-1">https://ubuntu.com/security/notices/USN-5297-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/25/12">https://www.openwall.com/lists/oss-security/2022/01/25/12</a><br></details> |
| linux-libc-dev | CVE-2022-0435 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0435">https://access.redhat.com/security/cve/CVE-2022-0435</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2048738">https://bugzilla.redhat.com/show_bug.cgi?id=2048738</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0435.html">https://linux.oracle.com/cve/CVE-2022-0435.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9245.html">https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href="https://ubuntu.com/security/notices/USN-5302-1">https://ubuntu.com/security/notices/USN-5302-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://ubuntu.com/security/notices/USN-5339-1">https://ubuntu.com/security/notices/USN-5339-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/02/10/1">https://www.openwall.com/lists/oss-security/2022/02/10/1</a><br></details> |
| linux-libc-dev | CVE-2022-0492 | HIGH | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html">http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0492">https://access.redhat.com/security/cve/CVE-2022-0492</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2051505">https://bugzilla.redhat.com/show_bug.cgi?id=2051505</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0492.html">https://linux.oracle.com/cve/CVE-2022-0492.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9245.html">https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">https://nvd.nist.gov/vuln/detail/CVE-2022-0492</a><br><a href="https://ubuntu.com/security/notices/USN-5302-1">https://ubuntu.com/security/notices/USN-5302-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://ubuntu.com/security/notices/USN-5339-1">https://ubuntu.com/security/notices/USN-5339-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2022/dsa-5095">https://www.debian.org/security/2022/dsa-5095</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2022/02/04/1">https://www.openwall.com/lists/oss-security/2022/02/04/1</a><br></details> |
| linux-libc-dev | CVE-2022-0500 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0500">https://access.redhat.com/security/cve/CVE-2022-0500</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044578">https://bugzilla.redhat.com/show_bug.cgi?id=2044578</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57</a><br></details> |
| linux-libc-dev | CVE-2022-1011 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1011">https://access.redhat.com/security/cve/CVE-2022-1011</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next">https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">https://nvd.nist.gov/vuln/detail/CVE-2022-1011</a><br></details> |
| linux-libc-dev | CVE-2022-1048 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1048">https://access.redhat.com/security/cve/CVE-2022-1048</a><br><a href="https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3">https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3</a><br></details> |
| linux-libc-dev | CVE-2022-23036 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-23037 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-23038 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-23039 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-23040 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-23041 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-23042 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042</a><br><a href="https://xenbits.xen.org/xsa/advisory-396.html">https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-396.txt">https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details> |
| linux-libc-dev | CVE-2022-24958 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24958">https://access.redhat.com/security/cve/CVE-2022-24958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda</a><br><a href="https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74">https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74</a><br><a href="https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda">https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">https://nvd.nist.gov/vuln/detail/CVE-2022-24958</a><br><a href="https://security.netapp.com/advisory/ntap-20220225-0008/">https://security.netapp.com/advisory/ntap-20220225-0008/</a><br></details> |
| linux-libc-dev | CVE-2022-26490 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-26490">https://access.redhat.com/security/cve/CVE-2022-26490</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490</a><br><a href="https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)">https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)</a><br><a href="https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221">https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">https://nvd.nist.gov/vuln/detail/CVE-2022-26490</a><br></details> |
| linux-libc-dev | CVE-2022-27223 | HIGH | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27223">https://access.redhat.com/security/cve/CVE-2022-27223</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223</a><br><a href="https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)">https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)</a><br><a href="https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d">https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">https://nvd.nist.gov/vuln/detail/CVE-2022-27223</a><br></details> |
| linux-libc-dev | CVE-2017-18232 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0558f33c06bb910e2879e355192227a8e8f0219d">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0558f33c06bb910e2879e355192227a8e8f0219d</a><br><a href="http://www.securityfocus.com/bid/103423">http://www.securityfocus.com/bid/103423</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3083">https://access.redhat.com/errata/RHSA-2018:3083</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3096">https://access.redhat.com/errata/RHSA-2018:3096</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18232">https://access.redhat.com/security/cve/CVE-2017-18232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232</a><br><a href="https://github.com/torvalds/linux/commit/0558f33c06bb910e2879e355192227a8e8f0219d">https://github.com/torvalds/linux/commit/0558f33c06bb910e2879e355192227a8e8f0219d</a><br><a href="https://linux.oracle.com/cve/CVE-2017-18232.html">https://linux.oracle.com/cve/CVE-2017-18232.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3083.html">https://linux.oracle.com/errata/ELSA-2018-3083.html</a><br><a href="https://ubuntu.com/security/notices/USN-4163-1">https://ubuntu.com/security/notices/USN-4163-1</a><br><a href="https://ubuntu.com/security/notices/USN-4163-2">https://ubuntu.com/security/notices/USN-4163-2</a><br><a href="https://usn.ubuntu.com/4163-1/">https://usn.ubuntu.com/4163-1/</a><br><a href="https://usn.ubuntu.com/4163-2/">https://usn.ubuntu.com/4163-2/</a><br><a href="https://www.debian.org/security/2018/dsa-4187">https://www.debian.org/security/2018/dsa-4187</a><br></details> |
| linux-libc-dev | CVE-2018-10322 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103960">http://www.securityfocus.com/bid/103960</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2948">https://access.redhat.com/errata/RHSA-2018:2948</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3083">https://access.redhat.com/errata/RHSA-2018:3083</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3096">https://access.redhat.com/errata/RHSA-2018:3096</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-10322">https://access.redhat.com/security/cve/CVE-2018-10322</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=199377">https://bugzilla.kernel.org/show_bug.cgi?id=199377</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322</a><br><a href="https://linux.oracle.com/cve/CVE-2018-10322.html">https://linux.oracle.com/cve/CVE-2018-10322.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-4509.html">https://linux.oracle.com/errata/ELSA-2019-4509.html</a><br><a href="https://ubuntu.com/security/notices/USN-4578-1">https://ubuntu.com/security/notices/USN-4578-1</a><br><a href="https://ubuntu.com/security/notices/USN-4579-1">https://ubuntu.com/security/notices/USN-4579-1</a><br><a href="https://usn.ubuntu.com/4578-1/">https://usn.ubuntu.com/4578-1/</a><br><a href="https://usn.ubuntu.com/4579-1/">https://usn.ubuntu.com/4579-1/</a><br><a href="https://www.spinics.net/lists/linux-xfs/msg17215.html">https://www.spinics.net/lists/linux-xfs/msg17215.html</a><br></details> |
| linux-libc-dev | CVE-2018-1108 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104055">http://www.securityfocus.com/bid/104055</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1108">https://access.redhat.com/security/cve/CVE-2018-1108</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1559">https://bugs.chromium.org/p/project-zero/issues/detail?id=1559</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117</a><br><a href="https://ubuntu.com/security/notices/USN-3752-1">https://ubuntu.com/security/notices/USN-3752-1</a><br><a href="https://ubuntu.com/security/notices/USN-3752-2">https://ubuntu.com/security/notices/USN-3752-2</a><br><a href="https://ubuntu.com/security/notices/USN-3752-3">https://ubuntu.com/security/notices/USN-3752-3</a><br><a href="https://usn.ubuntu.com/3718-1/">https://usn.ubuntu.com/3718-1/</a><br><a href="https://usn.ubuntu.com/3718-2/">https://usn.ubuntu.com/3718-2/</a><br><a href="https://usn.ubuntu.com/3752-1/">https://usn.ubuntu.com/3752-1/</a><br><a href="https://usn.ubuntu.com/3752-2/">https://usn.ubuntu.com/3752-2/</a><br><a href="https://usn.ubuntu.com/3752-3/">https://usn.ubuntu.com/3752-3/</a><br><a href="https://www.debian.org/security/2018/dsa-4188">https://www.debian.org/security/2018/dsa-4188</a><br></details> |
| linux-libc-dev | CVE-2018-12929 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104588">http://www.securityfocus.com/bid/104588</a><br><a href="https://access.redhat.com/errata/RHSA-2019:0641">https://access.redhat.com/errata/RHSA-2019:0641</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12929">https://access.redhat.com/security/cve/CVE-2018-12929</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403">https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929</a><br><a href="https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2">https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2</a><br></details> |
| linux-libc-dev | CVE-2018-13095 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/errata/RHSA-2019:1350">https://access.redhat.com/errata/RHSA-2019:1350</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2029">https://access.redhat.com/errata/RHSA-2019:2029</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2043">https://access.redhat.com/errata/RHSA-2019:2043</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-13095">https://access.redhat.com/security/cve/CVE-2018-13095</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=199915">https://bugzilla.kernel.org/show_bug.cgi?id=199915</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095</a><br><a href="https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&amp;id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3">https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&amp;id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3</a><br><a href="https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3">https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3</a><br><a href="https://linux.oracle.com/cve/CVE-2018-13095.html">https://linux.oracle.com/cve/CVE-2018-13095.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2029.html">https://linux.oracle.com/errata/ELSA-2019-2029.html</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://ubuntu.com/security/notices/USN-4907-1">https://ubuntu.com/security/notices/USN-4907-1</a><br></details> |
| linux-libc-dev | CVE-2018-20449 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-20449">https://access.redhat.com/security/cve/CVE-2018-20449</a><br><a href="https://elixir.bootlin.com/linux/v4.14.90/source/drivers/dma/qcom/hidma_dbg.c#L92">https://elixir.bootlin.com/linux/v4.14.90/source/drivers/dma/qcom/hidma_dbg.c#L92</a><br><a href="https://security.netapp.com/advisory/ntap-20190502-0002/">https://security.netapp.com/advisory/ntap-20190502-0002/</a><br><a href="https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03808.html">https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03808.html</a><br></details> |
| linux-libc-dev | CVE-2018-7273 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103088">http://www.securityfocus.com/bid/103088</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-7273">https://access.redhat.com/security/cve/CVE-2018-7273</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273</a><br><a href="https://lkml.org/lkml/2018/2/20/669">https://lkml.org/lkml/2018/2/20/669</a><br><a href="https://www.exploit-db.com/exploits/44325/">https://www.exploit-db.com/exploits/44325/</a><br></details> |
| linux-libc-dev | CVE-2018-7754 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7754">https://access.redhat.com/security/cve/CVE-2018-7754</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7754</a><br><a href="https://elixir.bootlin.com/linux/v4.16-rc4/source/drivers/block/aoe/aoeblk.c#L421">https://elixir.bootlin.com/linux/v4.16-rc4/source/drivers/block/aoe/aoeblk.c#L421</a><br><a href="https://github.com/johnsonwangqize/cve-linux/blob/master/CVE-2018-7754.md">https://github.com/johnsonwangqize/cve-linux/blob/master/CVE-2018-7754.md</a><br></details> |
| linux-libc-dev | CVE-2019-0146 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0146">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0146</a><br><a href="https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html">https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html</a><br><a href="https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/">https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html</a><br></details> |
| linux-libc-dev | CVE-2019-0147 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0147</a><br><a href="https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html">https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html</a><br><a href="https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/">https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html</a><br></details> |
| linux-libc-dev | CVE-2019-0148 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0148">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0148</a><br><a href="https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html">https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html</a><br><a href="https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/">https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/</a><br><a href="https://ubuntu.com/security/notices/USN-4681-1">https://ubuntu.com/security/notices/USN-4681-1</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html</a><br></details> |
| linux-libc-dev | CVE-2019-0149 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html</a><br></details> |
| linux-libc-dev | CVE-2019-12984 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html">http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html</a><br><a href="http://www.securityfocus.com/bid/108905">http://www.securityfocus.com/bid/108905</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12984">https://access.redhat.com/security/cve/CVE-2019-12984</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984</a><br><a href="https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51">https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51</a><br><a href="https://seclists.org/bugtraq/2019/Aug/13">https://seclists.org/bugtraq/2019/Aug/13</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0001/">https://security.netapp.com/advisory/ntap-20190806-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4093-1">https://ubuntu.com/security/notices/USN-4093-1</a><br><a href="https://ubuntu.com/security/notices/USN-4094-1">https://ubuntu.com/security/notices/USN-4094-1</a><br><a href="https://ubuntu.com/security/notices/USN-4117-1">https://ubuntu.com/security/notices/USN-4117-1</a><br><a href="https://ubuntu.com/security/notices/USN-4118-1">https://ubuntu.com/security/notices/USN-4118-1</a><br><a href="https://usn.ubuntu.com/4093-1/">https://usn.ubuntu.com/4093-1/</a><br><a href="https://usn.ubuntu.com/4094-1/">https://usn.ubuntu.com/4094-1/</a><br><a href="https://usn.ubuntu.com/4117-1/">https://usn.ubuntu.com/4117-1/</a><br><a href="https://usn.ubuntu.com/4118-1/">https://usn.ubuntu.com/4118-1/</a><br><a href="https://www.debian.org/security/2019/dsa-4495">https://www.debian.org/security/2019/dsa-4495</a><br></details> |
| linux-libc-dev | CVE-2019-19036 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19036">https://access.redhat.com/security/cve/CVE-2019-19036</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036</a><br><a href="https://security.netapp.com/advisory/ntap-20191205-0001/">https://security.netapp.com/advisory/ntap-20191205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4414-1">https://ubuntu.com/security/notices/USN-4414-1</a><br><a href="https://ubuntu.com/security/notices/USN-4439-1">https://ubuntu.com/security/notices/USN-4439-1</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br><a href="https://usn.ubuntu.com/4439-1/">https://usn.ubuntu.com/4439-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19039 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19039">https://access.redhat.com/security/cve/CVE-2019-19039</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html</a><br><a href="https://ubuntu.com/security/notices/USN-4414-1">https://ubuntu.com/security/notices/USN-4414-1</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19318 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19318">https://access.redhat.com/security/cve/CVE-2019-19318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19318</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19813 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19813">https://access.redhat.com/security/cve/CVE-2019-19813</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19813">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19813</a><br><a href="https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813">https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19813.html">https://linux.oracle.com/cve/CVE-2019-19813.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9534.html">https://linux.oracle.com/errata/ELSA-2021-9534.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200103-0001/">https://security.netapp.com/advisory/ntap-20200103-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4414-1">https://ubuntu.com/security/notices/USN-4414-1</a><br><a href="https://ubuntu.com/security/notices/USN-4708-1">https://ubuntu.com/security/notices/USN-4708-1</a><br><a href="https://ubuntu.com/security/notices/USN-4709-1">https://ubuntu.com/security/notices/USN-4709-1</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br></details> |
| linux-libc-dev | CVE-2019-20794 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/08/24/1">http://www.openwall.com/lists/oss-security/2020/08/24/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20794">https://access.redhat.com/security/cve/CVE-2019-20794</a><br><a href="https://github.com/sargun/fuse-example">https://github.com/sargun/fuse-example</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20794">https://nvd.nist.gov/vuln/detail/CVE-2019-20794</a><br><a href="https://security.netapp.com/advisory/ntap-20200608-0001/">https://security.netapp.com/advisory/ntap-20200608-0001/</a><br><a href="https://sourceforge.net/p/fuse/mailman/message/36598753/">https://sourceforge.net/p/fuse/mailman/message/36598753/</a><br></details> |
| linux-libc-dev | CVE-2019-20908 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/20/6">http://www.openwall.com/lists/oss-security/2020/07/20/6</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/29/3">http://www.openwall.com/lists/oss-security/2020/07/29/3</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/30/2">http://www.openwall.com/lists/oss-security/2020/07/30/2</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/30/3">http://www.openwall.com/lists/oss-security/2020/07/30/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20908">https://access.redhat.com/security/cve/CVE-2019-20908</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20908</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e</a><br><a href="https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh">https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20908.html">https://linux.oracle.com/cve/CVE-2019-20908.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5804.html">https://linux.oracle.com/errata/ELSA-2020-5804.html</a><br><a href="https://lore.kernel.org/linux-efi/20200615202408.2242614-1-pjones@redhat.com/">https://lore.kernel.org/linux-efi/20200615202408.2242614-1-pjones@redhat.com/</a><br><a href="https://mailarchives.bentasker.co.uk/Mirrors/OSSSec/2020/06-Jun/msg00035.html">https://mailarchives.bentasker.co.uk/Mirrors/OSSSec/2020/06-Jun/msg00035.html</a><br><a href="https://ubuntu.com/security/notices/USN-4426-1">https://ubuntu.com/security/notices/USN-4426-1</a><br><a href="https://ubuntu.com/security/notices/USN-4427-1">https://ubuntu.com/security/notices/USN-4427-1</a><br><a href="https://ubuntu.com/security/notices/USN-4439-1">https://ubuntu.com/security/notices/USN-4439-1</a><br><a href="https://ubuntu.com/security/notices/USN-4440-1">https://ubuntu.com/security/notices/USN-4440-1</a><br><a href="https://usn.ubuntu.com/4426-1/">https://usn.ubuntu.com/4426-1/</a><br><a href="https://usn.ubuntu.com/4427-1/">https://usn.ubuntu.com/4427-1/</a><br><a href="https://usn.ubuntu.com/4439-1/">https://usn.ubuntu.com/4439-1/</a><br><a href="https://usn.ubuntu.com/4440-1/">https://usn.ubuntu.com/4440-1/</a><br><a href="https://www.openwall.com/lists/oss-security/2020/06/14/1">https://www.openwall.com/lists/oss-security/2020/06/14/1</a><br></details> |
| linux-libc-dev | CVE-2019-3874 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/errata/RHSA-2019:3309">https://access.redhat.com/errata/RHSA-2019:3309</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3517">https://access.redhat.com/errata/RHSA-2019:3517</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3874">https://access.redhat.com/security/cve/CVE-2019-3874</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874</a><br><a href="https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594">https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa">https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911">https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3874.html">https://linux.oracle.com/cve/CVE-2019-3874.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5885.html">https://linux.oracle.com/errata/ELSA-2020-5885.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html</a><br><a href="https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u">https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u</a><br><a href="https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/">https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/</a><br><a href="https://security.netapp.com/advisory/ntap-20190411-0003/">https://security.netapp.com/advisory/ntap-20190411-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-3979-1">https://ubuntu.com/security/notices/USN-3979-1</a><br><a href="https://ubuntu.com/security/notices/USN-3980-1">https://ubuntu.com/security/notices/USN-3980-1</a><br><a href="https://ubuntu.com/security/notices/USN-3980-2">https://ubuntu.com/security/notices/USN-3980-2</a><br><a href="https://ubuntu.com/security/notices/USN-3981-1">https://ubuntu.com/security/notices/USN-3981-1</a><br><a href="https://ubuntu.com/security/notices/USN-3981-2">https://ubuntu.com/security/notices/USN-3981-2</a><br><a href="https://ubuntu.com/security/notices/USN-3982-1">https://ubuntu.com/security/notices/USN-3982-1</a><br><a href="https://ubuntu.com/security/notices/USN-3982-2">https://ubuntu.com/security/notices/USN-3982-2</a><br><a href="https://usn.ubuntu.com/3979-1/">https://usn.ubuntu.com/3979-1/</a><br><a href="https://usn.ubuntu.com/3980-1/">https://usn.ubuntu.com/3980-1/</a><br><a href="https://usn.ubuntu.com/3980-2/">https://usn.ubuntu.com/3980-2/</a><br><a href="https://usn.ubuntu.com/3981-1/">https://usn.ubuntu.com/3981-1/</a><br><a href="https://usn.ubuntu.com/3981-2/">https://usn.ubuntu.com/3981-2/</a><br><a href="https://usn.ubuntu.com/3982-1/">https://usn.ubuntu.com/3982-1/</a><br><a href="https://usn.ubuntu.com/3982-2/">https://usn.ubuntu.com/3982-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
| linux-libc-dev | CVE-2019-9245 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9245">https://access.redhat.com/security/cve/CVE-2019-9245</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9245</a><br><a href="https://git.kernel.org/linus/64beba0558fce7b59e9a8a7afd77290e82a22163">https://git.kernel.org/linus/64beba0558fce7b59e9a8a7afd77290e82a22163</a><br><a href="https://source.android.com/security/bulletin/pixel/2019-09-01">https://source.android.com/security/bulletin/pixel/2019-09-01</a><br></details> |
| linux-libc-dev | CVE-2019-9444 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9444">https://access.redhat.com/security/cve/CVE-2019-9444</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9444</a><br><a href="https://lore.kernel.org/patchwork/patch/902287/">https://lore.kernel.org/patchwork/patch/902287/</a><br><a href="https://source.android.com/security/bulletin/pixel/2019-09-01">https://source.android.com/security/bulletin/pixel/2019-09-01</a><br></details> |
| linux-libc-dev | CVE-2019-9453 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9453">https://access.redhat.com/security/cve/CVE-2019-9453</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9453">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9453</a><br><a href="https://git.kernel.org/linus/2777e654371dd4207a3a7f4fb5fa39550053a080">https://git.kernel.org/linus/2777e654371dd4207a3a7f4fb5fa39550053a080</a><br><a href="https://source.android.com/security/bulletin/pixel/2019-09-01">https://source.android.com/security/bulletin/pixel/2019-09-01</a><br><a href="https://ubuntu.com/security/notices/USN-4527-1">https://ubuntu.com/security/notices/USN-4527-1</a><br><a href="https://usn.ubuntu.com/4527-1/">https://usn.ubuntu.com/4527-1/</a><br></details> |
| linux-libc-dev | CVE-2020-0067 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://android.googlesource.com/kernel/common/+/688078e7">http://android.googlesource.com/kernel/common/+/688078e7</a><br><a href="http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html">http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-0067">https://access.redhat.com/security/cve/CVE-2020-0067</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0067">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0067</a><br><a href="https://git.kernel.org/linus/688078e7f36c293dae25b338ddc9e0a2790f6e06">https://git.kernel.org/linus/688078e7f36c293dae25b338ddc9e0a2790f6e06</a><br><a href="https://source.android.com/security/bulletin/pixel/2020-04-01">https://source.android.com/security/bulletin/pixel/2020-04-01</a><br><a href="https://ubuntu.com/security/notices/USN-4387-1">https://ubuntu.com/security/notices/USN-4387-1</a><br><a href="https://ubuntu.com/security/notices/USN-4388-1">https://ubuntu.com/security/notices/USN-4388-1</a><br><a href="https://ubuntu.com/security/notices/USN-4389-1">https://ubuntu.com/security/notices/USN-4389-1</a><br><a href="https://ubuntu.com/security/notices/USN-4390-1">https://ubuntu.com/security/notices/USN-4390-1</a><br><a href="https://ubuntu.com/security/notices/USN-4527-1">https://ubuntu.com/security/notices/USN-4527-1</a><br><a href="https://usn.ubuntu.com/4387-1/">https://usn.ubuntu.com/4387-1/</a><br><a href="https://usn.ubuntu.com/4388-1/">https://usn.ubuntu.com/4388-1/</a><br><a href="https://usn.ubuntu.com/4389-1/">https://usn.ubuntu.com/4389-1/</a><br><a href="https://usn.ubuntu.com/4390-1/">https://usn.ubuntu.com/4390-1/</a><br><a href="https://usn.ubuntu.com/4527-1/">https://usn.ubuntu.com/4527-1/</a><br></details> |
| linux-libc-dev | CVE-2020-12363 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-12363">https://access.redhat.com/security/cve/CVE-2020-12363</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12363.html">https://linux.oracle.com/cve/CVE-2020-12363.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2314.html">https://linux.oracle.com/errata/ELSA-2021-2314.html</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html</a><br></details> |
| linux-libc-dev | CVE-2020-12364 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-12364">https://access.redhat.com/security/cve/CVE-2020-12364</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12364.html">https://linux.oracle.com/cve/CVE-2020-12364.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2314.html">https://linux.oracle.com/errata/ELSA-2021-2314.html</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html</a><br></details> |
| linux-libc-dev | CVE-2020-14304 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-14304">https://access.redhat.com/security/cve/CVE-2020-14304</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14304.html">https://linux.oracle.com/cve/CVE-2020-14304.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9410.html">https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href="https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/">https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/</a><br></details> |
| linux-libc-dev | CVE-2020-15780 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/20/7">http://www.openwall.com/lists/oss-security/2020/07/20/7</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/29/3">http://www.openwall.com/lists/oss-security/2020/07/29/3</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/30/2">http://www.openwall.com/lists/oss-security/2020/07/30/2</a><br><a href="http://www.openwall.com/lists/oss-security/2020/07/30/3">http://www.openwall.com/lists/oss-security/2020/07/30/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15780">https://access.redhat.com/security/cve/CVE-2020-15780</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354</a><br><a href="https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh">https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh</a><br><a href="https://linux.oracle.com/cve/CVE-2020-15780.html">https://linux.oracle.com/cve/CVE-2020-15780.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5792.html">https://linux.oracle.com/errata/ELSA-2020-5792.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15780">https://nvd.nist.gov/vuln/detail/CVE-2020-15780</a><br><a href="https://ubuntu.com/security/notices/USN-4425-1">https://ubuntu.com/security/notices/USN-4425-1</a><br><a href="https://ubuntu.com/security/notices/USN-4426-1">https://ubuntu.com/security/notices/USN-4426-1</a><br><a href="https://ubuntu.com/security/notices/USN-4439-1">https://ubuntu.com/security/notices/USN-4439-1</a><br><a href="https://ubuntu.com/security/notices/USN-4440-1">https://ubuntu.com/security/notices/USN-4440-1</a><br><a href="https://usn.ubuntu.com/4425-1/">https://usn.ubuntu.com/4425-1/</a><br><a href="https://usn.ubuntu.com/4426-1/">https://usn.ubuntu.com/4426-1/</a><br><a href="https://usn.ubuntu.com/4439-1/">https://usn.ubuntu.com/4439-1/</a><br><a href="https://usn.ubuntu.com/4440-1/">https://usn.ubuntu.com/4440-1/</a><br><a href="https://www.openwall.com/lists/oss-security/2020/06/15/3">https://www.openwall.com/lists/oss-security/2020/06/15/3</a><br></details> |
| linux-libc-dev | CVE-2020-15802 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-15802">https://access.redhat.com/security/cve/CVE-2020-15802</a><br><a href="https://arxiv.org/abs/2009.11776">https://arxiv.org/abs/2009.11776</a><br><a href="https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709">https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709</a><br><a href="https://hexhive.epfl.ch/BLURtooth/">https://hexhive.epfl.ch/BLURtooth/</a><br><a href="https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html">https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html</a><br><a href="https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/">https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/</a><br><a href="https://www.kb.cert.org/vuls/id/589825">https://www.kb.cert.org/vuls/id/589825</a><br><a href="https://www.kb.cert.org/vuls/id/589825/">https://www.kb.cert.org/vuls/id/589825/</a><br></details> |
| linux-libc-dev | CVE-2020-25673 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/01/1">http://www.openwall.com/lists/oss-security/2020/11/01/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-25673">https://access.redhat.com/security/cve/CVE-2020-25673</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/</a><br><a href="https://ubuntu.com/security/notices/USN-4977-1">https://ubuntu.com/security/notices/USN-4977-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/01/1">https://www.openwall.com/lists/oss-security/2020/11/01/1</a><br></details> |
| linux-libc-dev | CVE-2020-26139 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-26139">https://access.redhat.com/security/cve/CVE-2020-26139</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-26139.html">https://linux.oracle.com/cve/CVE-2020-26139.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63">https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br></details> |
| linux-libc-dev | CVE-2020-26141 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-26141">https://access.redhat.com/security/cve/CVE-2020-26141</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-26141.html">https://linux.oracle.com/cve/CVE-2020-26141.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63">https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br></details> |
| linux-libc-dev | CVE-2020-26145 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-26145">https://access.redhat.com/security/cve/CVE-2020-26145</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-26145.html">https://linux.oracle.com/cve/CVE-2020-26145.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br></details> |
| linux-libc-dev | CVE-2020-26147 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-26147">https://access.redhat.com/security/cve/CVE-2020-26147</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-26147.html">https://linux.oracle.com/cve/CVE-2020-26147.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63">https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br></details> |
| linux-libc-dev | CVE-2020-26555 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-26555">https://access.redhat.com/security/cve/CVE-2020-26555</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1918601">https://bugzilla.redhat.com/show_bug.cgi?id=1918601</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555</a><br><a href="https://kb.cert.org/vuls/id/799380">https://kb.cert.org/vuls/id/799380</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/">https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/</a><br><a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/">https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html</a><br></details> |
| linux-libc-dev | CVE-2020-26558 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-26558">https://access.redhat.com/security/cve/CVE-2020-26558</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558</a><br><a href="https://kb.cert.org/vuls/id/799380">https://kb.cert.org/vuls/id/799380</a><br><a href="https://linux.oracle.com/cve/CVE-2020-26558.html">https://linux.oracle.com/cve/CVE-2020-26558.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4432.html">https://linux.oracle.com/errata/ELSA-2021-4432.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/</a><br><a href="https://ubuntu.com/security/notices/USN-4989-1">https://ubuntu.com/security/notices/USN-4989-1</a><br><a href="https://ubuntu.com/security/notices/USN-4989-2">https://ubuntu.com/security/notices/USN-4989-2</a><br><a href="https://ubuntu.com/security/notices/USN-5017-1">https://ubuntu.com/security/notices/USN-5017-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5046-1">https://ubuntu.com/security/notices/USN-5046-1</a><br><a href="https://ubuntu.com/security/notices/USN-5050-1">https://ubuntu.com/security/notices/USN-5050-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/">https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/</a><br><a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/">https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html</a><br></details> |
| linux-libc-dev | CVE-2020-27777 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27777">https://access.redhat.com/security/cve/CVE-2020-27777</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1900844">https://bugzilla.redhat.com/show_bug.cgi?id=1900844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777</a><br><a href="https://git.kernel.org/linus/bd59380c5ba4147dcbaad3e582b55ccfd120b764">https://git.kernel.org/linus/bd59380c5ba4147dcbaad3e582b55ccfd120b764</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&amp;id=bd59380c5ba4147dcbaad3e582b55ccfd120b764">https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&amp;id=bd59380c5ba4147dcbaad3e582b55ccfd120b764</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27777.html">https://linux.oracle.com/cve/CVE-2020-27777.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4356.html">https://linux.oracle.com/errata/ELSA-2021-4356.html</a><br><a href="https://lkml.org/lkml/2020/12/8/950">https://lkml.org/lkml/2020/12/8/950</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">https://nvd.nist.gov/vuln/detail/CVE-2020-27777</a><br><a href="https://ubuntu.com/security/notices/USN-4679-1">https://ubuntu.com/security/notices/USN-4679-1</a><br><a href="https://ubuntu.com/security/notices/USN-4680-1">https://ubuntu.com/security/notices/USN-4680-1</a><br><a href="https://ubuntu.com/security/notices/USN-4708-1">https://ubuntu.com/security/notices/USN-4708-1</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/10/09/1">https://www.openwall.com/lists/oss-security/2020/10/09/1</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/23/2">https://www.openwall.com/lists/oss-security/2020/11/23/2</a><br></details> |
| linux-libc-dev | CVE-2020-27825 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27825">https://access.redhat.com/security/cve/CVE-2020-27825</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1905155">https://bugzilla.redhat.com/show_bug.cgi?id=1905155</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0008/">https://security.netapp.com/advisory/ntap-20210521-0008/</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br></details> |
| linux-libc-dev | CVE-2020-27835 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27835">https://access.redhat.com/security/cve/CVE-2020-27835</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1901709">https://bugzilla.redhat.com/show_bug.cgi?id=1901709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835</a><br><a href="https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79">https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27835.html">https://linux.oracle.com/cve/CVE-2020-27835.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1578.html">https://linux.oracle.com/errata/ELSA-2021-1578.html</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br></details> |
| linux-libc-dev | CVE-2020-29568 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568</a><br><a href="https://linux.oracle.com/cve/CVE-2020-29568.html">https://linux.oracle.com/cve/CVE-2020-29568.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9038.html">https://linux.oracle.com/errata/ELSA-2021-9038.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://ubuntu.com/security/notices/USN-4748-1">https://ubuntu.com/security/notices/USN-4748-1</a><br><a href="https://ubuntu.com/security/notices/USN-4749-1">https://ubuntu.com/security/notices/USN-4749-1</a><br><a href="https://ubuntu.com/security/notices/USN-4750-1">https://ubuntu.com/security/notices/USN-4750-1</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br><a href="https://xenbits.xen.org/xsa/advisory-349.html">https://xenbits.xen.org/xsa/advisory-349.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-349.html">https://xenbits.xenproject.org/xsa/advisory-349.html</a><br></details> |
| linux-libc-dev | CVE-2020-29660 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html">http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html</a><br><a href="http://www.openwall.com/lists/oss-security/2020/12/10/1">http://www.openwall.com/lists/oss-security/2020/12/10/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-29660">https://access.redhat.com/security/cve/CVE-2020-29660</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2125">https://bugs.chromium.org/p/project-zero/issues/detail?id=2125</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660</a><br><a href="https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9">https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9</a><br><a href="https://linux.oracle.com/cve/CVE-2020-29660.html">https://linux.oracle.com/cve/CVE-2020-29660.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9039.html">https://linux.oracle.com/errata/ELSA-2021-9039.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">https://nvd.nist.gov/vuln/detail/CVE-2020-29660</a><br><a href="https://security.netapp.com/advisory/ntap-20210122-0001/">https://security.netapp.com/advisory/ntap-20210122-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4748-1">https://ubuntu.com/security/notices/USN-4748-1</a><br><a href="https://ubuntu.com/security/notices/USN-4749-1">https://ubuntu.com/security/notices/USN-4749-1</a><br><a href="https://ubuntu.com/security/notices/USN-4750-1">https://ubuntu.com/security/notices/USN-4750-1</a><br><a href="https://ubuntu.com/security/notices/USN-4751-1">https://ubuntu.com/security/notices/USN-4751-1</a><br><a href="https://ubuntu.com/security/notices/USN-4752-1">https://ubuntu.com/security/notices/USN-4752-1</a><br><a href="https://ubuntu.com/security/notices/USN-5130-1">https://ubuntu.com/security/notices/USN-5130-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br></details> |
| linux-libc-dev | CVE-2020-36158 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36158">https://access.redhat.com/security/cve/CVE-2020-36158</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d</a><br><a href="https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1)">https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1)</a><br><a href="https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d">https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36158.html">https://linux.oracle.com/cve/CVE-2020-36158.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9043.html">https://linux.oracle.com/errata/ELSA-2021-9043.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/</a><br><a href="https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com">https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">https://nvd.nist.gov/vuln/detail/CVE-2020-36158</a><br><a href="https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/">https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/</a><br><a href="https://security.netapp.com/advisory/ntap-20210212-0002/">https://security.netapp.com/advisory/ntap-20210212-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4876-1">https://ubuntu.com/security/notices/USN-4876-1</a><br><a href="https://ubuntu.com/security/notices/USN-4877-1">https://ubuntu.com/security/notices/USN-4877-1</a><br><a href="https://ubuntu.com/security/notices/USN-4878-1">https://ubuntu.com/security/notices/USN-4878-1</a><br><a href="https://ubuntu.com/security/notices/USN-4879-1">https://ubuntu.com/security/notices/USN-4879-1</a><br><a href="https://ubuntu.com/security/notices/USN-4912-1">https://ubuntu.com/security/notices/USN-4912-1</a><br><a href="https://www.debian.org/security/2021/dsa-4843">https://www.debian.org/security/2021/dsa-4843</a><br></details> |
| linux-libc-dev | CVE-2020-36322 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36322">https://access.redhat.com/security/cve/CVE-2020-36322</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322</a><br><a href="https://git.kernel.org/linus/5d069dbe8aaf2a197142558b6fb2978189ba3454">https://git.kernel.org/linus/5d069dbe8aaf2a197142558b6fb2978189ba3454</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454</a><br><a href="https://linux.oracle.com/cve/CVE-2020-36322.html">https://linux.oracle.com/cve/CVE-2020-36322.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0063.html">https://linux.oracle.com/errata/ELSA-2022-0063.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2020-36516 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-36516">https://access.redhat.com/security/cve/CVE-2020-36516</a><br><a href="https://dl.acm.org/doi/10.1145/3372297.3417884">https://dl.acm.org/doi/10.1145/3372297.3417884</a><br><a href="https://www.spinics.net/lists/netdev/msg795642.html">https://www.spinics.net/lists/netdev/msg795642.html</a><br></details> |
| linux-libc-dev | CVE-2020-3702 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-3702">https://access.redhat.com/security/cve/CVE-2020-3702</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/">https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/</a><br><a href="https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928">https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928</a><br><a href="https://ubuntu.com/security/notices/USN-5113-1">https://ubuntu.com/security/notices/USN-5113-1</a><br><a href="https://ubuntu.com/security/notices/USN-5114-1">https://ubuntu.com/security/notices/USN-5114-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-1">https://ubuntu.com/security/notices/USN-5116-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-2">https://ubuntu.com/security/notices/USN-5116-2</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58">https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br><a href="https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin">https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin</a><br></details> |
| linux-libc-dev | CVE-2020-4788 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/20/3">http://www.openwall.com/lists/oss-security/2020/11/20/3</a><br><a href="http://www.openwall.com/lists/oss-security/2020/11/23/1">http://www.openwall.com/lists/oss-security/2020/11/23/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-4788">https://access.redhat.com/security/cve/CVE-2020-4788</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/189296">https://exchange.xforce.ibmcloud.com/vulnerabilities/189296</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c</a><br><a href="https://linux.oracle.com/cve/CVE-2020-4788.html">https://linux.oracle.com/cve/CVE-2020-4788.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9308.html">https://linux.oracle.com/errata/ELSA-2021-9308.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/</a><br><a href="https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc">https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc</a><br><a href="https://ubuntu.com/security/notices/USN-4657-1">https://ubuntu.com/security/notices/USN-4657-1</a><br><a href="https://ubuntu.com/security/notices/USN-4658-1">https://ubuntu.com/security/notices/USN-4658-1</a><br><a href="https://ubuntu.com/security/notices/USN-4659-1">https://ubuntu.com/security/notices/USN-4659-1</a><br><a href="https://ubuntu.com/security/notices/USN-4660-1">https://ubuntu.com/security/notices/USN-4660-1</a><br><a href="https://ubuntu.com/security/notices/USN-4681-1">https://ubuntu.com/security/notices/USN-4681-1</a><br><a href="https://www.ibm.com/support/pages/node/6370729">https://www.ibm.com/support/pages/node/6370729</a><br><a href="https://www.openwall.com/lists/oss-security/2020/11/20/3">https://www.openwall.com/lists/oss-security/2020/11/20/3</a><br></details> |
| linux-libc-dev | CVE-2021-0129 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-0129">https://access.redhat.com/security/cve/CVE-2021-0129</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129</a><br><a href="https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738">https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f</a><br><a href="https://linux.oracle.com/cve/CVE-2021-0129.html">https://linux.oracle.com/cve/CVE-2021-0129.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9088.html">https://linux.oracle.com/errata/ELSA-2022-9088.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210716-0002/">https://security.netapp.com/advisory/ntap-20210716-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5017-1">https://ubuntu.com/security/notices/USN-5017-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://ubuntu.com/security/notices/USN-5046-1">https://ubuntu.com/security/notices/USN-5046-1</a><br><a href="https://ubuntu.com/security/notices/USN-5050-1">https://ubuntu.com/security/notices/USN-5050-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2021/dsa-4951">https://www.debian.org/security/2021/dsa-4951</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html</a><br></details> |
| linux-libc-dev | CVE-2021-0920 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-0920">https://access.redhat.com/security/cve/CVE-2021-0920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920</a><br><a href="https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca">https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca</a><br><a href="https://linux.oracle.com/cve/CVE-2021-0920.html">https://linux.oracle.com/cve/CVE-2021-0920.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9014.html">https://linux.oracle.com/errata/ELSA-2022-9014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://source.android.com/security/bulletin/2021-11-01">https://source.android.com/security/bulletin/2021-11-01</a><br></details> |
| linux-libc-dev | CVE-2021-0935 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-0935">https://access.redhat.com/security/cve/CVE-2021-0935</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0935">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0935</a><br><a href="https://git.kernel.org/linus/2f987a76a97773beafbc615b9c4d8fe79129a7f4">https://git.kernel.org/linus/2f987a76a97773beafbc615b9c4d8fe79129a7f4</a><br><a href="https://git.kernel.org/linus/b954f94023dcc61388c8384f0f14eb8e42c863c5">https://git.kernel.org/linus/b954f94023dcc61388c8384f0f14eb8e42c863c5</a><br><a href="https://groups.google.com/g/syzkaller-bugs/c/N53POqzMUa0/m/bTV9futJBAAJ">https://groups.google.com/g/syzkaller-bugs/c/N53POqzMUa0/m/bTV9futJBAAJ</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-10-01">https://source.android.com/security/bulletin/pixel/2021-10-01</a><br></details> |
| linux-libc-dev | CVE-2021-0937 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0937">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0937</a><br><a href="https://git.kernel.org/linus/b29c457a6511435960115c0f548c4360d5f4801d">https://git.kernel.org/linus/b29c457a6511435960115c0f548c4360d5f4801d</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-10-01">https://source.android.com/security/bulletin/pixel/2021-10-01</a><br></details> |
| linux-libc-dev | CVE-2021-0941 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-0941">https://access.redhat.com/security/cve/CVE-2021-0941</a><br><a href="https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0">https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0941">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0941</a><br><a href="https://git.kernel.org/6306c1189e77a513bf02720450bb43bd4ba5d8ae">https://git.kernel.org/6306c1189e77a513bf02720450bb43bd4ba5d8ae</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-10-01">https://source.android.com/security/bulletin/pixel/2021-10-01</a><br></details> |
| linux-libc-dev | CVE-2021-20292 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20292">https://access.redhat.com/security/cve/CVE-2021-20292</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939686">https://bugzilla.redhat.com/show_bug.cgi?id=1939686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20292">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20292</a><br><a href="https://git.kernel.org/linus/5de5b6ecf97a021f29403aa272cb4e03318ef586">https://git.kernel.org/linus/5de5b6ecf97a021f29403aa272cb4e03318ef586</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-20317 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-20317">https://access.redhat.com/security/cve/CVE-2021-20317</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2005258">https://bugzilla.redhat.com/show_bug.cgi?id=2005258</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317</a><br><a href="https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)">https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1">https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20317.html">https://linux.oracle.com/cve/CVE-2021-20317.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4647.html">https://linux.oracle.com/errata/ELSA-2021-4647.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://ubuntu.com/security/notices/USN-5209-1">https://ubuntu.com/security/notices/USN-5209-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-20320 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20320">https://access.redhat.com/security/cve/CVE-2021-20320</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2010090">https://bugzilla.redhat.com/show_bug.cgi?id=2010090</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320</a><br><a href="https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/">https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20320">https://nvd.nist.gov/vuln/detail/CVE-2021-20320</a><br></details> |
| linux-libc-dev | CVE-2021-20321 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20321">https://access.redhat.com/security/cve/CVE-2021-20321</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013242">https://bugzilla.redhat.com/show_bug.cgi?id=2013242</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321</a><br><a href="https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)">https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20321.html">https://linux.oracle.com/cve/CVE-2021-20321.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9088.html">https://linux.oracle.com/errata/ELSA-2022-9088.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/">https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">https://nvd.nist.gov/vuln/detail/CVE-2021-20321</a><br><a href="https://ubuntu.com/security/notices/USN-5208-1">https://ubuntu.com/security/notices/USN-5208-1</a><br><a href="https://ubuntu.com/security/notices/USN-5209-1">https://ubuntu.com/security/notices/USN-5209-1</a><br><a href="https://ubuntu.com/security/notices/USN-5210-1">https://ubuntu.com/security/notices/USN-5210-1</a><br><a href="https://ubuntu.com/security/notices/USN-5218-1">https://ubuntu.com/security/notices/USN-5218-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-26931 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://xenbits.xen.org/xsa/advisory-362.html">http://xenbits.xen.org/xsa/advisory-362.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26931">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26931</a><br><a href="https://linux.oracle.com/cve/CVE-2021-26931.html">https://linux.oracle.com/cve/CVE-2021-26931.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9136.html">https://linux.oracle.com/errata/ELSA-2021-9136.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">https://nvd.nist.gov/vuln/detail/CVE-2021-26931</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0001/">https://security.netapp.com/advisory/ntap-20210326-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://ubuntu.com/security/notices/USN-4909-1">https://ubuntu.com/security/notices/USN-4909-1</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4949-1">https://ubuntu.com/security/notices/USN-4949-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/16/4">https://www.openwall.com/lists/oss-security/2021/02/16/4</a><br><a href="https://xenbits.xen.org/xsa/advisory-362.html">https://xenbits.xen.org/xsa/advisory-362.html</a><br></details> |
| linux-libc-dev | CVE-2021-26932 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://xenbits.xen.org/xsa/advisory-361.html">http://xenbits.xen.org/xsa/advisory-361.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932</a><br><a href="https://linux.oracle.com/cve/CVE-2021-26932.html">https://linux.oracle.com/cve/CVE-2021-26932.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9136.html">https://linux.oracle.com/errata/ELSA-2021-9136.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">https://nvd.nist.gov/vuln/detail/CVE-2021-26932</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0001/">https://security.netapp.com/advisory/ntap-20210326-0001/</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/16/3">https://www.openwall.com/lists/oss-security/2021/02/16/3</a><br><a href="https://xenbits.xen.org/xsa/advisory-361.html">https://xenbits.xen.org/xsa/advisory-361.html</a><br></details> |
| linux-libc-dev | CVE-2021-27363 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html">http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/06/1">http://www.openwall.com/lists/oss-security/2021/03/06/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27363">https://access.redhat.com/security/cve/CVE-2021-27363</a><br><a href="https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html">https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1182716">https://bugzilla.suse.com/show_bug.cgi?id=1182716</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363</a><br><a href="https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa">https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27363.html">https://linux.oracle.com/cve/CVE-2021-27363.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9175.html">https://linux.oracle.com/errata/ELSA-2021-9175.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">https://nvd.nist.gov/vuln/detail/CVE-2021-27363</a><br><a href="https://security.netapp.com/advisory/ntap-20210409-0001/">https://security.netapp.com/advisory/ntap-20210409-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4883-1">https://ubuntu.com/security/notices/USN-4883-1</a><br><a href="https://ubuntu.com/security/notices/USN-4887-1">https://ubuntu.com/security/notices/USN-4887-1</a><br><a href="https://ubuntu.com/security/notices/USN-4889-1">https://ubuntu.com/security/notices/USN-4889-1</a><br><a href="https://ubuntu.com/security/notices/USN-4901-1">https://ubuntu.com/security/notices/USN-4901-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/06/1">https://www.openwall.com/lists/oss-security/2021/03/06/1</a><br></details> |
| linux-libc-dev | CVE-2021-28038 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/05/1">http://www.openwall.com/lists/oss-security/2021/03/05/1</a><br><a href="http://xenbits.xen.org/xsa/advisory-367.html">http://xenbits.xen.org/xsa/advisory-367.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28038">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28038</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28038.html">https://linux.oracle.com/cve/CVE-2021-28038.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9221.html">https://linux.oracle.com/errata/ELSA-2021-9221.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210409-0001/">https://security.netapp.com/advisory/ntap-20210409-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://ubuntu.com/security/notices/USN-4911-1">https://ubuntu.com/security/notices/USN-4911-1</a><br><a href="https://ubuntu.com/security/notices/USN-4945-1">https://ubuntu.com/security/notices/USN-4945-1</a><br><a href="https://ubuntu.com/security/notices/USN-4945-2">https://ubuntu.com/security/notices/USN-4945-2</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://xenbits.xen.org/xsa/advisory-367.html">https://xenbits.xen.org/xsa/advisory-367.html</a><br></details> |
| linux-libc-dev | CVE-2021-28688 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688</a><br><a href="https://git.kernel.org/linus/a846738f8c3788d846ed1f587270d2f2e3d32432">https://git.kernel.org/linus/a846738f8c3788d846ed1f587270d2f2e3d32432</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28688.html">https://linux.oracle.com/cve/CVE-2021-28688.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9223.html">https://linux.oracle.com/errata/ELSA-2021-9223.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://xenbits.xen.org/xsa/advisory-371.html">https://xenbits.xen.org/xsa/advisory-371.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-371.txt">https://xenbits.xenproject.org/xsa/advisory-371.txt</a><br></details> |
| linux-libc-dev | CVE-2021-28711 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28711">https://access.redhat.com/security/cve/CVE-2021-28711</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://xenbits.xen.org/xsa/advisory-391.html">https://xenbits.xen.org/xsa/advisory-391.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-391.txt">https://xenbits.xenproject.org/xsa/advisory-391.txt</a><br></details> |
| linux-libc-dev | CVE-2021-28712 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28712">https://access.redhat.com/security/cve/CVE-2021-28712</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://xenbits.xen.org/xsa/advisory-391.html">https://xenbits.xen.org/xsa/advisory-391.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-391.txt">https://xenbits.xenproject.org/xsa/advisory-391.txt</a><br></details> |
| linux-libc-dev | CVE-2021-28713 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28713">https://access.redhat.com/security/cve/CVE-2021-28713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://xenbits.xen.org/xsa/advisory-391.html">https://xenbits.xen.org/xsa/advisory-391.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-391.txt">https://xenbits.xenproject.org/xsa/advisory-391.txt</a><br></details> |
| linux-libc-dev | CVE-2021-28714 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">https://nvd.nist.gov/vuln/detail/CVE-2021-28714</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://xenbits.xen.org/xsa/advisory-392.html">https://xenbits.xen.org/xsa/advisory-392.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-392.txt">https://xenbits.xenproject.org/xsa/advisory-392.txt</a><br></details> |
| linux-libc-dev | CVE-2021-28715 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">https://nvd.nist.gov/vuln/detail/CVE-2021-28715</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://xenbits.xen.org/xsa/advisory-392.html">https://xenbits.xen.org/xsa/advisory-392.html</a><br><a href="https://xenbits.xenproject.org/xsa/advisory-392.txt">https://xenbits.xenproject.org/xsa/advisory-392.txt</a><br></details> |
| linux-libc-dev | CVE-2021-28950 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-28950">https://access.redhat.com/security/cve/CVE-2021-28950</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950</a><br><a href="https://git.kernel.org/linus/775c5033a0d164622d9d10dd0f0a5531639ed3ed">https://git.kernel.org/linus/775c5033a0d164622d9d10dd0f0a5531639ed3ed</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28950.html">https://linux.oracle.com/cve/CVE-2021-28950.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9488.html">https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">https://nvd.nist.gov/vuln/detail/CVE-2021-28950</a><br><a href="https://ubuntu.com/security/notices/USN-4911-1">https://ubuntu.com/security/notices/USN-4911-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-28964 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28964">https://access.redhat.com/security/cve/CVE-2021-28964</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964</a><br><a href="https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5">https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28964.html">https://linux.oracle.com/cve/CVE-2021-28964.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9223.html">https://linux.oracle.com/errata/ELSA-2021-9223.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">https://nvd.nist.gov/vuln/detail/CVE-2021-28964</a><br><a href="https://security.netapp.com/advisory/ntap-20210430-0003/">https://security.netapp.com/advisory/ntap-20210430-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br></details> |
| linux-libc-dev | CVE-2021-28971 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28971">https://access.redhat.com/security/cve/CVE-2021-28971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28971">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28971</a><br><a href="https://git.kernel.org/linus/d88d05a9e0b6d9356e97129d4ff9942d765f46ea">https://git.kernel.org/linus/d88d05a9e0b6d9356e97129d4ff9942d765f46ea</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea</a><br><a href="https://linux.oracle.com/cve/CVE-2021-28971.html">https://linux.oracle.com/cve/CVE-2021-28971.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9223.html">https://linux.oracle.com/errata/ELSA-2021-9223.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">https://nvd.nist.gov/vuln/detail/CVE-2021-28971</a><br><a href="https://security.netapp.com/advisory/ntap-20210430-0003/">https://security.netapp.com/advisory/ntap-20210430-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br></details> |
| linux-libc-dev | CVE-2021-28972 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28972">https://access.redhat.com/security/cve/CVE-2021-28972</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972</a><br><a href="https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678">https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">https://nvd.nist.gov/vuln/detail/CVE-2021-28972</a><br><a href="https://security.netapp.com/advisory/ntap-20210430-0003/">https://security.netapp.com/advisory/ntap-20210430-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-29264 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29264">https://access.redhat.com/security/cve/CVE-2021-29264</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">https://nvd.nist.gov/vuln/detail/CVE-2021-29264</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4949-1">https://ubuntu.com/security/notices/USN-4949-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br></details> |
| linux-libc-dev | CVE-2021-29265 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29265">https://access.redhat.com/security/cve/CVE-2021-29265</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9380afd6df70e24eacbdbde33afc6a3950965d22">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9380afd6df70e24eacbdbde33afc6a3950965d22</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">https://nvd.nist.gov/vuln/detail/CVE-2021-29265</a><br><a href="https://ubuntu.com/security/notices/USN-4945-1">https://ubuntu.com/security/notices/USN-4945-1</a><br><a href="https://ubuntu.com/security/notices/USN-4945-2">https://ubuntu.com/security/notices/USN-4945-2</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4949-1">https://ubuntu.com/security/notices/USN-4949-1</a><br></details> |
| linux-libc-dev | CVE-2021-29647 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29647">https://access.redhat.com/security/cve/CVE-2021-29647</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">https://nvd.nist.gov/vuln/detail/CVE-2021-29647</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br></details> |
| linux-libc-dev | CVE-2021-29650 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29650">https://access.redhat.com/security/cve/CVE-2021-29650</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1</a><br><a href="https://linux.oracle.com/cve/CVE-2021-29650.html">https://linux.oracle.com/cve/CVE-2021-29650.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9223.html">https://linux.oracle.com/errata/ELSA-2021-9223.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">https://nvd.nist.gov/vuln/detail/CVE-2021-29650</a><br><a href="https://ubuntu.com/security/notices/USN-4945-1">https://ubuntu.com/security/notices/USN-4945-1</a><br><a href="https://ubuntu.com/security/notices/USN-4945-2">https://ubuntu.com/security/notices/USN-4945-2</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4947-1">https://ubuntu.com/security/notices/USN-4947-1</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4949-1">https://ubuntu.com/security/notices/USN-4949-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-30002 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-30002">https://access.redhat.com/security/cve/CVE-2021-30002</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1184120">https://bugzilla.suse.com/show_bug.cgi?id=1184120</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002</a><br><a href="https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899">https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">https://nvd.nist.gov/vuln/detail/CVE-2021-30002</a><br><a href="https://ubuntu.com/security/notices/USN-4945-1">https://ubuntu.com/security/notices/USN-4945-1</a><br><a href="https://ubuntu.com/security/notices/USN-4945-2">https://ubuntu.com/security/notices/USN-4945-2</a><br><a href="https://ubuntu.com/security/notices/USN-4946-1">https://ubuntu.com/security/notices/USN-4946-1</a><br><a href="https://ubuntu.com/security/notices/USN-4947-1">https://ubuntu.com/security/notices/USN-4947-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br></details> |
| linux-libc-dev | CVE-2021-3178 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3178">https://access.redhat.com/security/cve/CVE-2021-3178</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3178">https://nvd.nist.gov/vuln/detail/CVE-2021-3178</a><br><a href="https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/">https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/</a><br><a href="https://ubuntu.com/security/notices/USN-4876-1">https://ubuntu.com/security/notices/USN-4876-1</a><br><a href="https://ubuntu.com/security/notices/USN-4877-1">https://ubuntu.com/security/notices/USN-4877-1</a><br><a href="https://ubuntu.com/security/notices/USN-4878-1">https://ubuntu.com/security/notices/USN-4878-1</a><br><a href="https://ubuntu.com/security/notices/USN-4910-1">https://ubuntu.com/security/notices/USN-4910-1</a><br><a href="https://ubuntu.com/security/notices/USN-4912-1">https://ubuntu.com/security/notices/USN-4912-1</a><br></details> |
| linux-libc-dev | CVE-2021-31916 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-31916">https://access.redhat.com/security/cve/CVE-2021-31916</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1946965">https://bugzilla.redhat.com/show_bug.cgi?id=1946965</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916</a><br><a href="https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a">https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a</a><br><a href="https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a">https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a</a><br><a href="https://linux.oracle.com/cve/CVE-2021-31916.html">https://linux.oracle.com/cve/CVE-2021-31916.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9346.html">https://linux.oracle.com/errata/ELSA-2021-9346.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">https://nvd.nist.gov/vuln/detail/CVE-2021-31916</a><br><a href="https://seclists.org/oss-sec/2021/q1/268">https://seclists.org/oss-sec/2021/q1/268</a><br><a href="https://ubuntu.com/security/notices/USN-4948-1">https://ubuntu.com/security/notices/USN-4948-1</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-4982-1">https://ubuntu.com/security/notices/USN-4982-1</a><br><a href="https://ubuntu.com/security/notices/USN-4984-1">https://ubuntu.com/security/notices/USN-4984-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/28/1">https://www.openwall.com/lists/oss-security/2021/03/28/1</a><br></details> |
| linux-libc-dev | CVE-2021-33098 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33098">https://access.redhat.com/security/cve/CVE-2021-33098</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098</a><br><a href="https://security.netapp.com/advisory/ntap-20211210-0005/">https://security.netapp.com/advisory/ntap-20211210-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html</a><br></details> |
| linux-libc-dev | CVE-2021-33624 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/06/21/1">http://www.openwall.com/lists/oss-security/2021/06/21/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33624">https://access.redhat.com/security/cve/CVE-2021-33624</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e</a><br><a href="https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db">https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">https://nvd.nist.gov/vuln/detail/CVE-2021-33624</a><br><a href="https://ubuntu.com/security/notices/USN-5091-1">https://ubuntu.com/security/notices/USN-5091-1</a><br><a href="https://ubuntu.com/security/notices/USN-5091-2">https://ubuntu.com/security/notices/USN-5091-2</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/06/21/1">https://www.openwall.com/lists/oss-security/2021/06/21/1</a><br><a href="https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner">https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner</a><br></details> |
| linux-libc-dev | CVE-2021-3428 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3428">https://access.redhat.com/security/cve/CVE-2021-3428</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1972621">https://bugzilla.redhat.com/show_bug.cgi?id=1972621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3428.html">https://linux.oracle.com/cve/CVE-2021-3428.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9223.html">https://linux.oracle.com/errata/ELSA-2021-9223.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3428">https://ubuntu.com/security/CVE-2021-3428</a><br><a href="https://ubuntu.com/security/notices/USN-4979-1">https://ubuntu.com/security/notices/USN-4979-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/17/1">https://www.openwall.com/lists/oss-security/2021/03/17/1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/17/13">https://www.openwall.com/lists/oss-security/2021/03/17/13</a><br><a href="https://www.openwall.com/lists/oss-security/2021/03/17/5">https://www.openwall.com/lists/oss-security/2021/03/17/5</a><br></details> |
| linux-libc-dev | CVE-2021-34556 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/01/3">http://www.openwall.com/lists/oss-security/2021/08/01/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-34556">https://access.redhat.com/security/cve/CVE-2021-34556</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">https://nvd.nist.gov/vuln/detail/CVE-2021-34556</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/08/01/3">https://www.openwall.com/lists/oss-security/2021/08/01/3</a><br></details> |
| linux-libc-dev | CVE-2021-34693 | MEDIUM | 4.9.246-2 | 4.9.272-2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/06/15/1">http://www.openwall.com/lists/oss-security/2021/06/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-34693">https://access.redhat.com/security/cve/CVE-2021-34693</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693</a><br><a href="https://linux.oracle.com/cve/CVE-2021-34693.html">https://linux.oracle.com/cve/CVE-2021-34693.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9453.html">https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html</a><br><a href="https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/">https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">https://nvd.nist.gov/vuln/detail/CVE-2021-34693</a><br><a href="https://ubuntu.com/security/notices/USN-5045-1">https://ubuntu.com/security/notices/USN-5045-1</a><br><a href="https://ubuntu.com/security/notices/USN-5070-1">https://ubuntu.com/security/notices/USN-5070-1</a><br><a href="https://ubuntu.com/security/notices/USN-5073-1">https://ubuntu.com/security/notices/USN-5073-1</a><br><a href="https://ubuntu.com/security/notices/USN-5073-2">https://ubuntu.com/security/notices/USN-5073-2</a><br><a href="https://ubuntu.com/security/notices/USN-5073-3">https://ubuntu.com/security/notices/USN-5073-3</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2021/dsa-4941">https://www.debian.org/security/2021/dsa-4941</a><br><a href="https://www.openwall.com/lists/oss-security/2021/06/15/1">https://www.openwall.com/lists/oss-security/2021/06/15/1</a><br></details> |
| linux-libc-dev | CVE-2021-35477 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-35477">https://access.redhat.com/security/cve/CVE-2021-35477</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">https://nvd.nist.gov/vuln/detail/CVE-2021-35477</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/08/01/3">https://www.openwall.com/lists/oss-security/2021/08/01/3</a><br></details> |
| linux-libc-dev | CVE-2021-3564 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/25/1">http://www.openwall.com/lists/oss-security/2021/05/25/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/01/2">http://www.openwall.com/lists/oss-security/2021/06/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3564">https://access.redhat.com/security/cve/CVE-2021-3564</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1964139">https://bugzilla.redhat.com/show_bug.cgi?id=1964139</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3564.html">https://linux.oracle.com/cve/CVE-2021-3564.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0620.html">https://linux.oracle.com/errata/ELSA-2022-0620.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">https://nvd.nist.gov/vuln/detail/CVE-2021-3564</a><br><a href="https://ubuntu.com/security/notices/USN-5015-1">https://ubuntu.com/security/notices/USN-5015-1</a><br><a href="https://ubuntu.com/security/notices/USN-5044-1">https://ubuntu.com/security/notices/USN-5044-1</a><br><a href="https://ubuntu.com/security/notices/USN-5045-1">https://ubuntu.com/security/notices/USN-5045-1</a><br><a href="https://ubuntu.com/security/notices/USN-5046-1">https://ubuntu.com/security/notices/USN-5046-1</a><br><a href="https://ubuntu.com/security/notices/USN-5050-1">https://ubuntu.com/security/notices/USN-5050-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/25/1">https://www.openwall.com/lists/oss-security/2021/05/25/1</a><br></details> |
| linux-libc-dev | CVE-2021-3573 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3573">https://access.redhat.com/security/cve/CVE-2021-3573</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1966578">https://bugzilla.redhat.com/show_bug.cgi?id=1966578</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52">https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3573.html">https://linux.oracle.com/cve/CVE-2021-3573.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0620.html">https://linux.oracle.com/errata/ELSA-2022-0620.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">https://nvd.nist.gov/vuln/detail/CVE-2021-3573</a><br><a href="https://ubuntu.com/security/notices/USN-5015-1">https://ubuntu.com/security/notices/USN-5015-1</a><br><a href="https://ubuntu.com/security/notices/USN-5044-1">https://ubuntu.com/security/notices/USN-5044-1</a><br><a href="https://ubuntu.com/security/notices/USN-5045-1">https://ubuntu.com/security/notices/USN-5045-1</a><br><a href="https://ubuntu.com/security/notices/USN-5046-1">https://ubuntu.com/security/notices/USN-5046-1</a><br><a href="https://ubuntu.com/security/notices/USN-5050-1">https://ubuntu.com/security/notices/USN-5050-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.openwall.com/lists/oss-security/2021/06/08/2">https://www.openwall.com/lists/oss-security/2021/06/08/2</a><br></details> |
| linux-libc-dev | CVE-2021-3659 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3659">https://access.redhat.com/security/cve/CVE-2021-3659</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659</a><br><a href="https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8">https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3659.html">https://linux.oracle.com/cve/CVE-2021-3659.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4356.html">https://linux.oracle.com/errata/ELSA-2021-4356.html</a><br></details> |
| linux-libc-dev | CVE-2021-3669 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3669">https://access.redhat.com/security/cve/CVE-2021-3669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669</a><br><a href="https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/">https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/</a><br></details> |
| linux-libc-dev | CVE-2021-3679 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3679">https://access.redhat.com/security/cve/CVE-2021-3679</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1989165">https://bugzilla.redhat.com/show_bug.cgi?id=1989165</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679</a><br><a href="https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a">https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3679.html">https://linux.oracle.com/cve/CVE-2021-3679.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9488.html">https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/">https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">https://nvd.nist.gov/vuln/detail/CVE-2021-3679</a><br><a href="https://ubuntu.com/security/notices/USN-5091-1">https://ubuntu.com/security/notices/USN-5091-1</a><br><a href="https://ubuntu.com/security/notices/USN-5091-2">https://ubuntu.com/security/notices/USN-5091-2</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5094-1">https://ubuntu.com/security/notices/USN-5094-1</a><br><a href="https://ubuntu.com/security/notices/USN-5094-2">https://ubuntu.com/security/notices/USN-5094-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br></details> |
| linux-libc-dev | CVE-2021-37159 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37159">https://access.redhat.com/security/cve/CVE-2021-37159</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37159.html">https://linux.oracle.com/cve/CVE-2021-37159.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9475.html">https://linux.oracle.com/errata/ELSA-2021-9475.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/">https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">https://nvd.nist.gov/vuln/detail/CVE-2021-37159</a><br><a href="https://security.netapp.com/advisory/ntap-20210819-0003/">https://security.netapp.com/advisory/ntap-20210819-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5163-1">https://ubuntu.com/security/notices/USN-5163-1</a><br><a href="https://ubuntu.com/security/notices/USN-5164-1">https://ubuntu.com/security/notices/USN-5164-1</a><br><a href="https://www.spinics.net/lists/linux-usb/msg202228.html">https://www.spinics.net/lists/linux-usb/msg202228.html</a><br></details> |
| linux-libc-dev | CVE-2021-3732 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3732">https://access.redhat.com/security/cve/CVE-2021-3732</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995249">https://bugzilla.redhat.com/show_bug.cgi?id=1995249</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732</a><br><a href="https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631">https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631</a><br><a href="https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631">https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3732.html">https://linux.oracle.com/cve/CVE-2021-3732.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9577.html">https://linux.oracle.com/errata/ELSA-2021-9577.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">https://nvd.nist.gov/vuln/detail/CVE-2021-3732</a><br><a href="https://ubuntu.com/security/CVE-2021-3732">https://ubuntu.com/security/CVE-2021-3732</a><br><a href="https://ubuntu.com/security/notices/USN-5094-1">https://ubuntu.com/security/notices/USN-5094-1</a><br><a href="https://ubuntu.com/security/notices/USN-5094-2">https://ubuntu.com/security/notices/USN-5094-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5113-1">https://ubuntu.com/security/notices/USN-5113-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-1">https://ubuntu.com/security/notices/USN-5116-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-2">https://ubuntu.com/security/notices/USN-5116-2</a><br></details> |
| linux-libc-dev | CVE-2021-3753 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3753">https://access.redhat.com/security/cve/CVE-2021-3753</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1999589">https://bugzilla.redhat.com/show_bug.cgi?id=1999589</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753</a><br><a href="https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7">https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7</a><br><a href="https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7">https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3753.html">https://linux.oracle.com/cve/CVE-2021-3753.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9088.html">https://linux.oracle.com/errata/ELSA-2022-9088.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">https://nvd.nist.gov/vuln/detail/CVE-2021-3753</a><br><a href="https://ubuntu.com/security/notices/USN-5113-1">https://ubuntu.com/security/notices/USN-5113-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5117-1">https://ubuntu.com/security/notices/USN-5117-1</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/09/01/4">https://www.openwall.com/lists/oss-security/2021/09/01/4</a><br></details> |
| linux-libc-dev | CVE-2021-3759 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3759">https://access.redhat.com/security/cve/CVE-2021-3759</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759</a><br><a href="https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/">https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5117-1">https://ubuntu.com/security/notices/USN-5117-1</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br><a href="https://ubuntu.com/security/notices/USN-5135-1">https://ubuntu.com/security/notices/USN-5135-1</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-1">https://ubuntu.com/security/notices/USN-5137-1</a><br><a href="https://ubuntu.com/security/notices/USN-5137-2">https://ubuntu.com/security/notices/USN-5137-2</a><br></details> |
| linux-libc-dev | CVE-2021-3772 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3772">https://access.redhat.com/security/cve/CVE-2021-3772</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2000694">https://bugzilla.redhat.com/show_bug.cgi?id=2000694</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df</a><br><a href="https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df">https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">https://nvd.nist.gov/vuln/detail/CVE-2021-3772</a><br><a href="https://ubuntu.com/security/CVE-2021-3772">https://ubuntu.com/security/CVE-2021-3772</a><br><a href="https://ubuntu.com/security/notices/USN-5165-1">https://ubuntu.com/security/notices/USN-5165-1</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-38198 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38198">https://access.redhat.com/security/cve/CVE-2021-38198</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198</a><br><a href="https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7">https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7</a><br><a href="https://linux.oracle.com/cve/CVE-2021-38198.html">https://linux.oracle.com/cve/CVE-2021-38198.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9475.html">https://linux.oracle.com/errata/ELSA-2021-9475.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">https://nvd.nist.gov/vuln/detail/CVE-2021-38198</a><br><a href="https://ubuntu.com/security/notices/USN-5070-1">https://ubuntu.com/security/notices/USN-5070-1</a><br><a href="https://ubuntu.com/security/notices/USN-5114-1">https://ubuntu.com/security/notices/USN-5114-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-1">https://ubuntu.com/security/notices/USN-5116-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-2">https://ubuntu.com/security/notices/USN-5116-2</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-38199 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38199">https://access.redhat.com/security/cve/CVE-2021-38199</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c</a><br><a href="https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c">https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38199">https://nvd.nist.gov/vuln/detail/CVE-2021-38199</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0010/">https://security.netapp.com/advisory/ntap-20210902-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5091-1">https://ubuntu.com/security/notices/USN-5091-1</a><br><a href="https://ubuntu.com/security/notices/USN-5091-2">https://ubuntu.com/security/notices/USN-5091-2</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5106-1">https://ubuntu.com/security/notices/USN-5106-1</a><br><a href="https://ubuntu.com/security/notices/USN-5120-1">https://ubuntu.com/security/notices/USN-5120-1</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://www.debian.org/security/2021/dsa-4978">https://www.debian.org/security/2021/dsa-4978</a><br></details> |
| linux-libc-dev | CVE-2021-38204 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38204">https://access.redhat.com/security/cve/CVE-2021-38204</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b</a><br><a href="https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b">https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">https://nvd.nist.gov/vuln/detail/CVE-2021-38204</a><br><a href="https://ubuntu.com/security/notices/USN-5091-1">https://ubuntu.com/security/notices/USN-5091-1</a><br><a href="https://ubuntu.com/security/notices/USN-5091-2">https://ubuntu.com/security/notices/USN-5091-2</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5094-1">https://ubuntu.com/security/notices/USN-5094-1</a><br><a href="https://ubuntu.com/security/notices/USN-5094-2">https://ubuntu.com/security/notices/USN-5094-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5299-1">https://ubuntu.com/security/notices/USN-5299-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-38208 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/17/1">http://www.openwall.com/lists/oss-security/2021/08/17/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/2">http://www.openwall.com/lists/oss-security/2021/08/17/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/24/2">http://www.openwall.com/lists/oss-security/2021/08/24/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-38208">https://access.redhat.com/security/cve/CVE-2021-38208</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1992810">https://bugzilla.redhat.com/show_bug.cgi?id=1992810</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208</a><br><a href="https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba">https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">https://nvd.nist.gov/vuln/detail/CVE-2021-38208</a><br><a href="https://ubuntu.com/security/notices/USN-5050-1">https://ubuntu.com/security/notices/USN-5050-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-3847 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3847">https://access.redhat.com/security/cve/CVE-2021-3847</a><br><a href="https://www.openwall.com/lists/oss-security/2021/10/14/3">https://www.openwall.com/lists/oss-security/2021/10/14/3</a><br></details> |
| linux-libc-dev | CVE-2021-39633 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633</a><br><a href="https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14)">https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14)</a><br><a href="https://source.android.com/security/bulletin/2022-01-01">https://source.android.com/security/bulletin/2022-01-01</a><br></details> |
| linux-libc-dev | CVE-2021-39636 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39636">https://access.redhat.com/security/cve/CVE-2021-39636</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-12-01">https://source.android.com/security/bulletin/pixel/2021-12-01</a><br></details> |
| linux-libc-dev | CVE-2021-39648 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39648">https://access.redhat.com/security/cve/CVE-2021-39648</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39648</a><br><a href="https://git.kernel.org/linus/64e6bbfff52db4bf6785fab9cffab850b2de6870">https://git.kernel.org/linus/64e6bbfff52db4bf6785fab9cffab850b2de6870</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-12-01">https://source.android.com/security/bulletin/pixel/2021-12-01</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br></details> |
| linux-libc-dev | CVE-2021-39656 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39656</a><br><a href="https://git.kernel.org/linus/14fbbc8297728e880070f7b077b3301a8c698ef9 (5.12-rc3)">https://git.kernel.org/linus/14fbbc8297728e880070f7b077b3301a8c698ef9 (5.12-rc3)</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-12-01">https://source.android.com/security/bulletin/pixel/2021-12-01</a><br></details> |
| linux-libc-dev | CVE-2021-39657 | MEDIUM | 4.9.246-2 | 4.9.258-1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39657</a><br><a href="https://git.kernel.org/linus/35fc4cd34426c242ab015ef280853b7bff101f48 (5.11-rc4)">https://git.kernel.org/linus/35fc4cd34426c242ab015ef280853b7bff101f48 (5.11-rc4)</a><br><a href="https://lore.kernel.org/all/1609157080-26283-1-git-send-email-cang@codeaurora.org/">https://lore.kernel.org/all/1609157080-26283-1-git-send-email-cang@codeaurora.org/</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-12-01">https://source.android.com/security/bulletin/pixel/2021-12-01</a><br></details> |
| linux-libc-dev | CVE-2021-39711 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://source.android.com/security/bulletin/pixel/2022-03-01">https://source.android.com/security/bulletin/pixel/2022-03-01</a><br></details> |
| linux-libc-dev | CVE-2021-4002 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4002">https://access.redhat.com/security/cve/CVE-2021-4002</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025726">https://bugzilla.redhat.com/show_bug.cgi?id=2025726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002</a><br><a href="https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890">https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">https://nvd.nist.gov/vuln/detail/CVE-2021-4002</a><br><a href="https://ubuntu.com/security/notices/USN-5206-1">https://ubuntu.com/security/notices/USN-5206-1</a><br><a href="https://ubuntu.com/security/notices/USN-5207-1">https://ubuntu.com/security/notices/USN-5207-1</a><br><a href="https://ubuntu.com/security/notices/USN-5208-1">https://ubuntu.com/security/notices/USN-5208-1</a><br><a href="https://ubuntu.com/security/notices/USN-5209-1">https://ubuntu.com/security/notices/USN-5209-1</a><br><a href="https://ubuntu.com/security/notices/USN-5210-1">https://ubuntu.com/security/notices/USN-5210-1</a><br><a href="https://ubuntu.com/security/notices/USN-5211-1">https://ubuntu.com/security/notices/USN-5211-1</a><br><a href="https://ubuntu.com/security/notices/USN-5218-1">https://ubuntu.com/security/notices/USN-5218-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2021/11/25/1">https://www.openwall.com/lists/oss-security/2021/11/25/1</a><br></details> |
| linux-libc-dev | CVE-2021-4037 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4037">https://access.redhat.com/security/cve/CVE-2021-4037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848</a><br></details> |
| linux-libc-dev | CVE-2021-4149 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4149">https://access.redhat.com/security/cve/CVE-2021-4149</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2026485">https://bugzilla.redhat.com/show_bug.cgi?id=2026485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149</a><br><a href="https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)">https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)</a><br><a href="https://lkml.org/lkml/2021/10/18/885">https://lkml.org/lkml/2021/10/18/885</a><br><a href="https://lkml.org/lkml/2021/9/13/2565">https://lkml.org/lkml/2021/9/13/2565</a><br></details> |
| linux-libc-dev | CVE-2021-4155 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4155">https://access.redhat.com/security/cve/CVE-2021-4155</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155</a><br><a href="https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)">https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4155.html">https://linux.oracle.com/cve/CVE-2021-4155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9148.html">https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-2">https://ubuntu.com/security/notices/USN-5294-2</a><br><a href="https://ubuntu.com/security/notices/USN-5295-1">https://ubuntu.com/security/notices/USN-5295-1</a><br><a href="https://ubuntu.com/security/notices/USN-5295-2">https://ubuntu.com/security/notices/USN-5295-2</a><br><a href="https://ubuntu.com/security/notices/USN-5297-1">https://ubuntu.com/security/notices/USN-5297-1</a><br><a href="https://ubuntu.com/security/notices/USN-5298-1">https://ubuntu.com/security/notices/USN-5298-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/1">https://www.openwall.com/lists/oss-security/2022/01/10/1</a><br></details> |
| linux-libc-dev | CVE-2021-4157 | MEDIUM | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4157">https://access.redhat.com/security/cve/CVE-2021-4157</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2034342">https://bugzilla.redhat.com/show_bug.cgi?id=2034342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157</a><br><a href="https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)">https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)</a><br><a href="https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/">https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/</a><br></details> |
| linux-libc-dev | CVE-2021-4159 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4159">https://access.redhat.com/security/cve/CVE-2021-4159</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159</a><br></details> |
| linux-libc-dev | CVE-2021-4203 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4203">https://access.redhat.com/security/cve/CVE-2021-4203</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2230">https://bugs.chromium.org/p/project-zero/issues/detail?id=2230</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&amp;can=7&amp;q=modified-after%3Atoday-30&amp;sort=-modified&amp;colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&amp;cells=tiles&amp;redir=1">https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&amp;can=7&amp;q=modified-after%3Atoday-30&amp;sort=-modified&amp;colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&amp;cells=tiles&amp;redir=1</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036934">https://bugzilla.redhat.com/show_bug.cgi?id=2036934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203</a><br><a href="https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)">https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814</a><br><a href="https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/">https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/</a><br></details> |
| linux-libc-dev | CVE-2021-42739 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42739">https://access.redhat.com/security/cve/CVE-2021-42739</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e</a><br><a href="https://linux.oracle.com/cve/CVE-2021-42739.html">https://linux.oracle.com/cve/CVE-2021-42739.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0063.html">https://linux.oracle.com/errata/ELSA-2022-0063.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/</a><br><a href="https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/">https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">https://nvd.nist.gov/vuln/detail/CVE-2021-42739</a><br><a href="https://seclists.org/oss-sec/2021/q2/46">https://seclists.org/oss-sec/2021/q2/46</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0001/">https://security.netapp.com/advisory/ntap-20211118-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5165-1">https://ubuntu.com/security/notices/USN-5165-1</a><br><a href="https://ubuntu.com/security/notices/USN-5207-1">https://ubuntu.com/security/notices/USN-5207-1</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://ubuntu.com/security/notices/USN-5266-1">https://ubuntu.com/security/notices/USN-5266-1</a><br><a href="https://ubuntu.com/security/notices/USN-5267-1">https://ubuntu.com/security/notices/USN-5267-1</a><br><a href="https://ubuntu.com/security/notices/USN-5267-3">https://ubuntu.com/security/notices/USN-5267-3</a><br><a href="https://ubuntu.com/security/notices/USN-5268-1">https://ubuntu.com/security/notices/USN-5268-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-43389 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/11/05/1">http://www.openwall.com/lists/oss-security/2021/11/05/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-43389">https://access.redhat.com/security/cve/CVE-2021-43389</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013180">https://bugzilla.redhat.com/show_bug.cgi?id=2013180</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389</a><br><a href="https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d">https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/">https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">https://nvd.nist.gov/vuln/detail/CVE-2021-43389</a><br><a href="https://seclists.org/oss-sec/2021/q4/39">https://seclists.org/oss-sec/2021/q4/39</a><br><a href="https://ubuntu.com/security/notices/USN-5139-1">https://ubuntu.com/security/notices/USN-5139-1</a><br><a href="https://ubuntu.com/security/notices/USN-5165-1">https://ubuntu.com/security/notices/USN-5165-1</a><br><a href="https://ubuntu.com/security/notices/USN-5208-1">https://ubuntu.com/security/notices/USN-5208-1</a><br><a href="https://ubuntu.com/security/notices/USN-5209-1">https://ubuntu.com/security/notices/USN-5209-1</a><br><a href="https://ubuntu.com/security/notices/USN-5210-1">https://ubuntu.com/security/notices/USN-5210-1</a><br><a href="https://ubuntu.com/security/notices/USN-5218-1">https://ubuntu.com/security/notices/USN-5218-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.openwall.com/lists/oss-security/2021/10/19/1">https://www.openwall.com/lists/oss-security/2021/10/19/1</a><br></details> |
| linux-libc-dev | CVE-2021-43975 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43975">https://access.redhat.com/security/cve/CVE-2021-43975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/</a><br><a href="https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/">https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">https://nvd.nist.gov/vuln/detail/CVE-2021-43975</a><br><a href="https://security.netapp.com/advisory/ntap-20211210-0001/">https://security.netapp.com/advisory/ntap-20211210-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-2">https://ubuntu.com/security/notices/USN-5294-2</a><br><a href="https://ubuntu.com/security/notices/USN-5297-1">https://ubuntu.com/security/notices/USN-5297-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-43976 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43976">https://access.redhat.com/security/cve/CVE-2021-43976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84">https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">https://nvd.nist.gov/vuln/detail/CVE-2021-43976</a><br><a href="https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/">https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/</a><br><a href="https://security.netapp.com/advisory/ntap-20211210-0001/">https://security.netapp.com/advisory/ntap-20211210-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5302-1">https://ubuntu.com/security/notices/USN-5302-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://ubuntu.com/security/notices/USN-5339-1">https://ubuntu.com/security/notices/USN-5339-1</a><br><a href="https://www.debian.org/security/2022/dsa-5092">https://www.debian.org/security/2022/dsa-5092</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-44879 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-44879">https://access.redhat.com/security/cve/CVE-2021-44879</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=215231">https://bugzilla.kernel.org/show_bug.cgi?id=215231</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f</a><br><a href="https://lkml.org/lkml/2022/1/24/4067">https://lkml.org/lkml/2022/1/24/4067</a><br><a href="https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/">https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">https://nvd.nist.gov/vuln/detail/CVE-2021-44879</a><br><a href="https://ubuntu.com/security/notices/USN-5302-1">https://ubuntu.com/security/notices/USN-5302-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/02/12/1">https://www.openwall.com/lists/oss-security/2022/02/12/1</a><br></details> |
| linux-libc-dev | CVE-2021-45095 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45095">https://access.redhat.com/security/cve/CVE-2021-45095</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0</a><br><a href="https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0">https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/">https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">https://nvd.nist.gov/vuln/detail/CVE-2021-45095</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br><a href="https://ubuntu.com/security/notices/USN-5337-1">https://ubuntu.com/security/notices/USN-5337-1</a><br><a href="https://ubuntu.com/security/notices/USN-5338-1">https://ubuntu.com/security/notices/USN-5338-1</a><br><a href="https://ubuntu.com/security/notices/USN-5339-1">https://ubuntu.com/security/notices/USN-5339-1</a><br><a href="https://ubuntu.com/security/notices/USN-5343-1">https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.debian.org/security/2022/dsa-5050">https://www.debian.org/security/2022/dsa-5050</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2021-45868 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45868">https://access.redhat.com/security/cve/CVE-2021-45868</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=214655">https://bugzilla.kernel.org/show_bug.cgi?id=214655</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">https://nvd.nist.gov/vuln/detail/CVE-2021-45868</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/17/1">https://www.openwall.com/lists/oss-security/2022/03/17/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/17/2">https://www.openwall.com/lists/oss-security/2022/03/17/2</a><br></details> |
| linux-libc-dev | CVE-2022-0001 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/18/2">http://www.openwall.com/lists/oss-security/2022/03/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0001">https://access.redhat.com/security/cve/CVE-2022-0001</a><br><a href="https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250">https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001</a><br><a href="https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html">https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href="https://ubuntu.com/security/notices/USN-5317-1">https://ubuntu.com/security/notices/USN-5317-1</a><br><a href="https://ubuntu.com/security/notices/USN-5318-1">https://ubuntu.com/security/notices/USN-5318-1</a><br><a href="https://ubuntu.com/security/notices/USN-5319-1">https://ubuntu.com/security/notices/USN-5319-1</a><br><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a><br><a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href="https://www.vusec.net/projects/bhi-spectre-bhb/">https://www.vusec.net/projects/bhi-spectre-bhb/</a><br></details> |
| linux-libc-dev | CVE-2022-0002 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/18/2">http://www.openwall.com/lists/oss-security/2022/03/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0002">https://access.redhat.com/security/cve/CVE-2022-0002</a><br><a href="https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250">https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002</a><br><a href="https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html">https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href="https://ubuntu.com/security/notices/USN-5317-1">https://ubuntu.com/security/notices/USN-5317-1</a><br><a href="https://ubuntu.com/security/notices/USN-5318-1">https://ubuntu.com/security/notices/USN-5318-1</a><br><a href="https://ubuntu.com/security/notices/USN-5319-1">https://ubuntu.com/security/notices/USN-5319-1</a><br><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a><br><a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href="https://www.vusec.net/projects/bhi-spectre-bhb/">https://www.vusec.net/projects/bhi-spectre-bhb/</a><br></details> |
| linux-libc-dev | CVE-2022-0168 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0168">https://access.redhat.com/security/cve/CVE-2022-0168</a><br></details> |
| linux-libc-dev | CVE-2022-0480 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0480">https://access.redhat.com/security/cve/CVE-2022-0480</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2049700">https://bugzilla.redhat.com/show_bug.cgi?id=2049700</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480</a><br><a href="https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)">https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)</a><br><a href="https://github.com/kata-containers/kata-containers/issues/3373">https://github.com/kata-containers/kata-containers/issues/3373</a><br><a href="https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/">https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/</a><br></details> |
| linux-libc-dev | CVE-2022-0487 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0487">https://access.redhat.com/security/cve/CVE-2022-0487</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044561">https://bugzilla.redhat.com/show_bug.cgi?id=2044561</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/</a><br><a href="https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">https://nvd.nist.gov/vuln/detail/CVE-2022-0487</a><br><a href="https://www.debian.org/security/2022/dsa-5095">https://www.debian.org/security/2022/dsa-5095</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2022-0494 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0494">https://access.redhat.com/security/cve/CVE-2022-0494</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2039448">https://bugzilla.redhat.com/show_bug.cgi?id=2039448</a><br><a href="https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/">https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/</a><br></details> |
| linux-libc-dev | CVE-2022-0617 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0617">https://access.redhat.com/security/cve/CVE-2022-0617</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617</a><br><a href="https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee">https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee</a><br><a href="https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f">https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/">https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">https://nvd.nist.gov/vuln/detail/CVE-2022-0617</a><br><a href="https://www.debian.org/security/2022/dsa-5095">https://www.debian.org/security/2022/dsa-5095</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2022-0644 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0644">https://access.redhat.com/security/cve/CVE-2022-0644</a><br><a href="https://lkml.org/lkml/2021/10/6/254">https://lkml.org/lkml/2021/10/6/254</a><br><a href="https://lore.kernel.org/all/20211007220110.600005-1-willy@infradead.org/">https://lore.kernel.org/all/20211007220110.600005-1-willy@infradead.org/</a><br></details> |
| linux-libc-dev | CVE-2022-0812 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0812">https://access.redhat.com/security/cve/CVE-2022-0812</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2058361">https://bugzilla.redhat.com/show_bug.cgi?id=2058361</a><br><a href="https://twitter.com/iMilnb/status/1497125078252806161">https://twitter.com/iMilnb/status/1497125078252806161</a><br></details> |
| linux-libc-dev | CVE-2022-0850 | MEDIUM | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0850">https://access.redhat.com/security/cve/CVE-2022-0850</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2060606">https://bugzilla.redhat.com/show_bug.cgi?id=2060606</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe</a><br><a href="https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8">https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8</a><br></details> |
| linux-libc-dev | CVE-2022-0854 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0854">https://access.redhat.com/security/cve/CVE-2022-0854</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&amp;id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&amp;id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13</a><br></details> |
| linux-libc-dev | CVE-2022-1015 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1015">https://access.redhat.com/security/cve/CVE-2022-1015</a><br><a href="https://seclists.org/oss-sec/2022/q1/205">https://seclists.org/oss-sec/2022/q1/205</a><br></details> |
| linux-libc-dev | CVE-2022-1016 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1016">https://access.redhat.com/security/cve/CVE-2022-1016</a><br><a href="https://seclists.org/oss-sec/2022/q1/205">https://seclists.org/oss-sec/2022/q1/205</a><br></details> |
| linux-libc-dev | CVE-2022-23960 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/18/2">http://www.openwall.com/lists/oss-security/2022/03/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-23960">https://access.redhat.com/security/cve/CVE-2022-23960</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960</a><br><a href="https://developer.arm.com/documentation/ka004995/latest/">https://developer.arm.com/documentation/ka004995/latest/</a><br><a href="https://developer.arm.com/support/arm-security-updates">https://developer.arm.com/support/arm-security-updates</a><br><a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability">https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb">https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23960.html">https://linux.oracle.com/cve/CVE-2022-23960.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9245.html">https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href="https://ubuntu.com/security/notices/USN-5317-1">https://ubuntu.com/security/notices/USN-5317-1</a><br><a href="https://ubuntu.com/security/notices/USN-5318-1">https://ubuntu.com/security/notices/USN-5318-1</a><br><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a><br><a href="https://www.vusec.net/projects/bhi-spectre-bhb/">https://www.vusec.net/projects/bhi-spectre-bhb/</a><br></details> |
| linux-libc-dev | CVE-2022-25258 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-25258">https://access.redhat.com/security/cve/CVE-2022-25258</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258</a><br><a href="https://github.com/szymonh/d-os-descriptor">https://github.com/szymonh/d-os-descriptor</a><br><a href="https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c">https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">https://nvd.nist.gov/vuln/detail/CVE-2022-25258</a><br><a href="https://www.debian.org/security/2022/dsa-5092">https://www.debian.org/security/2022/dsa-5092</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2022-25375 | MEDIUM | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/21/1">http://www.openwall.com/lists/oss-security/2022/02/21/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25375">https://access.redhat.com/security/cve/CVE-2022-25375</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375</a><br><a href="https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)">https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)</a><br><a href="https://github.com/szymonh/rndis-co">https://github.com/szymonh/rndis-co</a><br><a href="https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826">https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">https://nvd.nist.gov/vuln/detail/CVE-2022-25375</a><br><a href="https://www.debian.org/security/2022/dsa-5092">https://www.debian.org/security/2022/dsa-5092</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2022-26966 | MEDIUM | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-26966">https://access.redhat.com/security/cve/CVE-2022-26966</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966</a><br><a href="https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)">https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">https://nvd.nist.gov/vuln/detail/CVE-2022-26966</a><br></details> |
| linux-libc-dev | CVE-2004-0230 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc">ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc</a><br><a href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt">ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt</a><br><a href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt">ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt</a><br><a href="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt">ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt</a><br><a href="ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc">ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc</a><br><a href="http://kb.juniper.net/JSA10638">http://kb.juniper.net/JSA10638</a><br><a href="http://marc.info/?l=bugtraq&amp;m=108302060014745&amp;w=2">http://marc.info/?l=bugtraq&amp;m=108302060014745&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=108506952116653&amp;w=2">http://marc.info/?l=bugtraq&amp;m=108506952116653&amp;w=2</a><br><a href="http://secunia.com/advisories/11440">http://secunia.com/advisories/11440</a><br><a href="http://secunia.com/advisories/11458">http://secunia.com/advisories/11458</a><br><a href="http://secunia.com/advisories/22341">http://secunia.com/advisories/22341</a><br><a href="http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml">http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml</a><br><a href="http://www.kb.cert.org/vuls/id/415294">http://www.kb.cert.org/vuls/id/415294</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a><br><a href="http://www.osvdb.org/4030">http://www.osvdb.org/4030</a><br><a href="http://www.securityfocus.com/archive/1/449179/100/0/threaded">http://www.securityfocus.com/archive/1/449179/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/10183">http://www.securityfocus.com/bid/10183</a><br><a href="http://www.uniras.gov.uk/vuls/2004/236929/index.htm">http://www.uniras.gov.uk/vuls/2004/236929/index.htm</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA04-111A.html">http://www.us-cert.gov/cas/techalerts/TA04-111A.html</a><br><a href="http://www.vupen.com/english/advisories/2006/3983">http://www.vupen.com/english/advisories/2006/3983</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/15886">https://exchange.xforce.ibmcloud.com/vulnerabilities/15886</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10053">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10053</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711</a><br></details> |
| linux-libc-dev | CVE-2005-3660 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/18205">http://secunia.com/advisories/18205</a><br><a href="http://securityreason.com/securityalert/291">http://securityreason.com/securityalert/291</a><br><a href="http://securitytracker.com/id?1015402">http://securitytracker.com/id?1015402</a><br><a href="http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362">http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362</a><br><a href="http://www.securityfocus.com/bid/16041">http://www.securityfocus.com/bid/16041</a><br><a href="http://www.vupen.com/english/advisories/2005/3076">http://www.vupen.com/english/advisories/2005/3076</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/23835">https://exchange.xforce.ibmcloud.com/vulnerabilities/23835</a><br></details> |
| linux-libc-dev | CVE-2007-3719 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://osvdb.org/37127">http://osvdb.org/37127</a><br><a href="http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf">http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-3719">https://access.redhat.com/security/cve/CVE-2007-3719</a><br></details> |
| linux-libc-dev | CVE-2008-2544 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2008-2544">https://access.redhat.com/security/cve/CVE-2008-2544</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=213135">https://bugzilla.redhat.com/show_bug.cgi?id=213135</a><br></details> |
| linux-libc-dev | CVE-2008-4609 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://blog.robertlee.name/2008/10/conjecture-speculation.html">http://blog.robertlee.name/2008/10/conjecture-speculation.html</a><br><a href="http://insecure.org/stf/tcp-dos-attack-explained.html">http://insecure.org/stf/tcp-dos-attack-explained.html</a><br><a href="http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html">http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html</a><br><a href="http://marc.info/?l=bugtraq&amp;m=125856010926699&amp;w=2">http://marc.info/?l=bugtraq&amp;m=125856010926699&amp;w=2</a><br><a href="http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked">http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked</a><br><a href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml">http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml</a><br><a href="http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html">http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html</a><br><a href="http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2013:150">http://www.mandriva.com/security/advisories?name=MDVSA-2013:150</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html</a><br><a href="http://www.outpost24.com/news/news-2008-10-02.html">http://www.outpost24.com/news/news-2008-10-02.html</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA09-251A.html">http://www.us-cert.gov/cas/techalerts/TA09-251A.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-4609">https://access.redhat.com/security/cve/CVE-2008-4609</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-4609">https://nvd.nist.gov/vuln/detail/CVE-2008-4609</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340</a><br><a href="https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html">https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html</a><br></details> |
| linux-libc-dev | CVE-2010-4563 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://seclists.org/dailydave/2011/q2/25">http://seclists.org/dailydave/2011/q2/25</a><br><a href="http://seclists.org/fulldisclosure/2011/Apr/254">http://seclists.org/fulldisclosure/2011/Apr/254</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4563">https://access.redhat.com/security/cve/CVE-2010-4563</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4563">https://nvd.nist.gov/vuln/detail/CVE-2010-4563</a><br></details> |
| linux-libc-dev | CVE-2010-5321 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://linuxtv.org/irc/v4l/index.php?date=2010-07-29">http://linuxtv.org/irc/v4l/index.php?date=2010-07-29</a><br><a href="http://www.openwall.com/lists/oss-security/2015/02/08/4">http://www.openwall.com/lists/oss-security/2015/02/08/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-5321">https://access.redhat.com/security/cve/CVE-2010-5321</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=120571">https://bugzilla.kernel.org/show_bug.cgi?id=120571</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=620629">https://bugzilla.redhat.com/show_bug.cgi?id=620629</a><br></details> |
| linux-libc-dev | CVE-2011-4915 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201</a><br><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497</a><br><a href="http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html">http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/07/9">http://www.openwall.com/lists/oss-security/2011/11/07/9</a><br><a href="https://lkml.org/lkml/2011/11/7/340">https://lkml.org/lkml/2011/11/7/340</a><br><a href="https://seclists.org/oss-sec/2011/q4/571">https://seclists.org/oss-sec/2011/q4/571</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-4915">https://security-tracker.debian.org/tracker/CVE-2011-4915</a><br><a href="https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131">https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131</a><br></details> |
| linux-libc-dev | CVE-2011-4917 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary></details> |
| linux-libc-dev | CVE-2012-4542 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=linux-kernel&amp;m=135903967015813&amp;w=2">http://marc.info/?l=linux-kernel&amp;m=135903967015813&amp;w=2</a><br><a href="http://marc.info/?l=linux-kernel&amp;m=135904012416042&amp;w=2">http://marc.info/?l=linux-kernel&amp;m=135904012416042&amp;w=2</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-0496.html">http://rhn.redhat.com/errata/RHSA-2013-0496.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-0579.html">http://rhn.redhat.com/errata/RHSA-2013-0579.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-0882.html">http://rhn.redhat.com/errata/RHSA-2013-0882.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-0928.html">http://rhn.redhat.com/errata/RHSA-2013-0928.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2012-4542">https://access.redhat.com/security/cve/CVE-2012-4542</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=875360">https://bugzilla.redhat.com/show_bug.cgi?id=875360</a><br><a href="https://linux.oracle.com/cve/CVE-2012-4542.html">https://linux.oracle.com/cve/CVE-2012-4542.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2013-2534.html">https://linux.oracle.com/errata/ELSA-2013-2534.html</a><br><a href="https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8">https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8</a><br></details> |
| linux-libc-dev | CVE-2014-9892 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://source.android.com/security/bulletin/2016-08-01.html">http://source.android.com/security/bulletin/2016-08-01.html</a><br><a href="http://www.securityfocus.com/bid/92222">http://www.securityfocus.com/bid/92222</a><br><a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e">https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e</a><br></details> |
| linux-libc-dev | CVE-2014-9900 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://source.android.com/security/bulletin/2016-08-01.html">http://source.android.com/security/bulletin/2016-08-01.html</a><br><a href="http://www.securityfocus.com/bid/92222">http://www.securityfocus.com/bid/92222</a><br><a href="https://access.redhat.com/security/cve/CVE-2014-9900">https://access.redhat.com/security/cve/CVE-2014-9900</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900</a><br><a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071">https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071</a><br><a href="https://ubuntu.com/security/notices/USN-3358-1">https://ubuntu.com/security/notices/USN-3358-1</a><br><a href="https://ubuntu.com/security/notices/USN-3359-1">https://ubuntu.com/security/notices/USN-3359-1</a><br><a href="https://ubuntu.com/security/notices/USN-3360-1">https://ubuntu.com/security/notices/USN-3360-1</a><br><a href="https://ubuntu.com/security/notices/USN-3360-2">https://ubuntu.com/security/notices/USN-3360-2</a><br><a href="https://ubuntu.com/security/notices/USN-3364-1">https://ubuntu.com/security/notices/USN-3364-1</a><br><a href="https://ubuntu.com/security/notices/USN-3364-2">https://ubuntu.com/security/notices/USN-3364-2</a><br><a href="https://ubuntu.com/security/notices/USN-3364-3">https://ubuntu.com/security/notices/USN-3364-3</a><br><a href="https://ubuntu.com/security/notices/USN-3371-1">https://ubuntu.com/security/notices/USN-3371-1</a><br></details> |
| linux-libc-dev | CVE-2015-2877 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.antoniobarresi.com/files/cain_advisory.txt">http://www.antoniobarresi.com/files/cain_advisory.txt</a><br><a href="http://www.kb.cert.org/vuls/id/935424">http://www.kb.cert.org/vuls/id/935424</a><br><a href="http://www.securityfocus.com/bid/76256">http://www.securityfocus.com/bid/76256</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-2877">https://access.redhat.com/security/cve/CVE-2015-2877</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1252096">https://bugzilla.redhat.com/show_bug.cgi?id=1252096</a><br><a href="https://www.kb.cert.org/vuls/id/BGAR-A2CNKG">https://www.kb.cert.org/vuls/id/BGAR-A2CNKG</a><br><a href="https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH">https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH</a><br><a href="https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf">https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf</a><br></details> |
| linux-libc-dev | CVE-2016-10723 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723</a><br><a href="https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/">https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/</a><br><a href="https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/">https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/</a><br><a href="https://patchwork.kernel.org/patch/10395909/">https://patchwork.kernel.org/patch/10395909/</a><br><a href="https://patchwork.kernel.org/patch/9842889/">https://patchwork.kernel.org/patch/9842889/</a><br><a href="https://www.spinics.net/lists/linux-mm/msg117896.html">https://www.spinics.net/lists/linux-mm/msg117896.html</a><br></details> |
| linux-libc-dev | CVE-2016-8660 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/10/13/8">http://www.openwall.com/lists/oss-security/2016/10/13/8</a><br><a href="http://www.securityfocus.com/bid/93558">http://www.securityfocus.com/bid/93558</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-8660">https://access.redhat.com/security/cve/CVE-2016-8660</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1384851">https://bugzilla.redhat.com/show_bug.cgi?id=1384851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660</a><br><a href="https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/">https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/</a><br><a href="https://marc.info/?l=linux-fsdevel&amp;m=147639177409294&amp;w=2">https://marc.info/?l=linux-fsdevel&amp;m=147639177409294&amp;w=2</a><br><a href="https://marc.info/?l=linux-xfs&amp;m=149498118228320&amp;w=2">https://marc.info/?l=linux-xfs&amp;m=149498118228320&amp;w=2</a><br></details> |
| linux-libc-dev | CVE-2017-0630 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/98213">http://www.securityfocus.com/bid/98213</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-0630">https://access.redhat.com/security/cve/CVE-2017-0630</a><br><a href="https://source.android.com/security/bulletin/2017-05-01">https://source.android.com/security/bulletin/2017-05-01</a><br><a href="https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem">https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem</a><br></details> |
| linux-libc-dev | CVE-2017-11472 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3b2d69114fefa474fca542e51119036dceb4aa6f">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3b2d69114fefa474fca542e51119036dceb4aa6f</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11472">https://access.redhat.com/security/cve/CVE-2017-11472</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11472">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11472</a><br><a href="https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6">https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6</a><br><a href="https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f">https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f</a><br><a href="https://ubuntu.com/security/notices/USN-3619-1">https://ubuntu.com/security/notices/USN-3619-1</a><br><a href="https://ubuntu.com/security/notices/USN-3619-2">https://ubuntu.com/security/notices/USN-3619-2</a><br><a href="https://ubuntu.com/security/notices/USN-3754-1">https://ubuntu.com/security/notices/USN-3754-1</a><br><a href="https://usn.ubuntu.com/3619-1/">https://usn.ubuntu.com/3619-1/</a><br><a href="https://usn.ubuntu.com/3619-2/">https://usn.ubuntu.com/3619-2/</a><br><a href="https://usn.ubuntu.com/3754-1/">https://usn.ubuntu.com/3754-1/</a><br></details> |
| linux-libc-dev | CVE-2017-12762 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2017/q3/274">http://seclists.org/oss-sec/2017/q3/274</a><br><a href="http://www.openwall.com/lists/oss-security/2020/02/11/1">http://www.openwall.com/lists/oss-security/2020/02/11/1</a><br><a href="http://www.openwall.com/lists/oss-security/2020/02/11/2">http://www.openwall.com/lists/oss-security/2020/02/11/2</a><br><a href="http://www.openwall.com/lists/oss-security/2020/02/14/4">http://www.openwall.com/lists/oss-security/2020/02/14/4</a><br><a href="http://www.securityfocus.com/bid/100251">http://www.securityfocus.com/bid/100251</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12762">https://access.redhat.com/security/cve/CVE-2017-12762</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762</a><br><a href="https://patchwork.kernel.org/patch/9880041/">https://patchwork.kernel.org/patch/9880041/</a><br><a href="https://ubuntu.com/security/notices/USN-3420-1">https://ubuntu.com/security/notices/USN-3420-1</a><br><a href="https://ubuntu.com/security/notices/USN-3420-2">https://ubuntu.com/security/notices/USN-3420-2</a><br><a href="https://ubuntu.com/security/notices/USN-3620-1">https://ubuntu.com/security/notices/USN-3620-1</a><br><a href="https://ubuntu.com/security/notices/USN-3620-2">https://ubuntu.com/security/notices/USN-3620-2</a><br><a href="https://usn.ubuntu.com/3620-1/">https://usn.ubuntu.com/3620-1/</a><br><a href="https://usn.ubuntu.com/3620-2/">https://usn.ubuntu.com/3620-2/</a><br></details> |
| linux-libc-dev | CVE-2017-13693 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100502">http://www.securityfocus.com/bid/100502</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13693">https://access.redhat.com/security/cve/CVE-2017-13693</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693</a><br><a href="https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732">https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732</a><br><a href="https://patchwork.kernel.org/patch/9919053/">https://patchwork.kernel.org/patch/9919053/</a><br></details> |
| linux-libc-dev | CVE-2017-13694 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100500">http://www.securityfocus.com/bid/100500</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13694">https://access.redhat.com/security/cve/CVE-2017-13694</a><br><a href="https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0">https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0</a><br><a href="https://patchwork.kernel.org/patch/9806085/">https://patchwork.kernel.org/patch/9806085/</a><br></details> |
| linux-libc-dev | CVE-2017-13695 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100497">http://www.securityfocus.com/bid/100497</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-13695">https://access.redhat.com/security/cve/CVE-2017-13695</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695</a><br><a href="https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5">https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5</a><br><a href="https://linux.oracle.com/cve/CVE-2017-13695.html">https://linux.oracle.com/cve/CVE-2017-13695.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-4250.html">https://linux.oracle.com/errata/ELSA-2018-4250.html</a><br><a href="https://patchwork.kernel.org/patch/9850567/">https://patchwork.kernel.org/patch/9850567/</a><br><a href="https://ubuntu.com/security/notices/USN-3696-1">https://ubuntu.com/security/notices/USN-3696-1</a><br><a href="https://ubuntu.com/security/notices/USN-3696-2">https://ubuntu.com/security/notices/USN-3696-2</a><br><a href="https://ubuntu.com/security/notices/USN-3762-1">https://ubuntu.com/security/notices/USN-3762-1</a><br><a href="https://ubuntu.com/security/notices/USN-3762-2">https://ubuntu.com/security/notices/USN-3762-2</a><br><a href="https://usn.ubuntu.com/3696-1/">https://usn.ubuntu.com/3696-1/</a><br><a href="https://usn.ubuntu.com/3696-2/">https://usn.ubuntu.com/3696-2/</a><br><a href="https://usn.ubuntu.com/3762-1/">https://usn.ubuntu.com/3762-1/</a><br><a href="https://usn.ubuntu.com/3762-2/">https://usn.ubuntu.com/3762-2/</a><br></details> |
| linux-libc-dev | CVE-2017-9986 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/99336">http://www.securityfocus.com/bid/99336</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-9986">https://access.redhat.com/security/cve/CVE-2017-9986</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=196135">https://bugzilla.kernel.org/show_bug.cgi?id=196135</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9986">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9986</a><br></details> |
| linux-libc-dev | CVE-2018-1121 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q2/122">http://seclists.org/oss-sec/2018/q2/122</a><br><a href="http://www.securityfocus.com/bid/104214">http://www.securityfocus.com/bid/104214</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1121">https://access.redhat.com/security/cve/CVE-2018-1121</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121</a><br><a href="https://www.exploit-db.com/exploits/44806/">https://www.exploit-db.com/exploits/44806/</a><br><a href="https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt">https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt</a><br></details> |
| linux-libc-dev | CVE-2018-12928 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/104593">http://www.securityfocus.com/bid/104593</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-12928">https://access.redhat.com/security/cve/CVE-2018-12928</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384">https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928</a><br><a href="https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ">https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ</a><br><a href="https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/">https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/</a><br><a href="https://marc.info/?l=linux-fsdevel&amp;m=152407263325766&amp;w=2">https://marc.info/?l=linux-fsdevel&amp;m=152407263325766&amp;w=2</a><br></details> |
| linux-libc-dev | CVE-2018-17977 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/105539">http://www.securityfocus.com/bid/105539</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-17977">https://access.redhat.com/security/cve/CVE-2018-17977</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1111609">https://bugzilla.suse.com/show_bug.cgi?id=1111609</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977</a><br><a href="https://www.openwall.com/lists/oss-security/2018/10/05/5">https://www.openwall.com/lists/oss-security/2018/10/05/5</a><br></details> |
| linux-libc-dev | CVE-2018-20669 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/i915/i915_gem_execbuffer.c">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/i915/i915_gem_execbuffer.c</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html">http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/01/23/6">http://www.openwall.com/lists/oss-security/2019/01/23/6</a><br><a href="http://www.securityfocus.com/bid/106748">http://www.securityfocus.com/bid/106748</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20669">https://access.redhat.com/security/cve/CVE-2018-20669</a><br><a href="https://access.redhat.com/security/cve/cve-2018-20669">https://access.redhat.com/security/cve/cve-2018-20669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a><br><a href="https://linux.oracle.com/cve/CVE-2018-20669.html">https://linux.oracle.com/cve/CVE-2018-20669.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5885.html">https://linux.oracle.com/errata/ELSA-2020-5885.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0002/">https://security.netapp.com/advisory/ntap-20190404-0002/</a><br><a href="https://support.f5.com/csp/article/K32059550">https://support.f5.com/csp/article/K32059550</a><br><a href="https://ubuntu.com/security/notices/USN-4485-1">https://ubuntu.com/security/notices/USN-4485-1</a><br><a href="https://usn.ubuntu.com/4485-1/">https://usn.ubuntu.com/4485-1/</a><br><a href="https://www.openwall.com/lists/oss-security/2019/01/23/6">https://www.openwall.com/lists/oss-security/2019/01/23/6</a><br><a href="https://www.openwall.com/lists/oss-security/2019/02/07/1">https://www.openwall.com/lists/oss-security/2019/02/07/1</a><br></details> |
| linux-libc-dev | CVE-2018-8043 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5</a><br><a href="http://www.securitytracker.com/id/1040749">http://www.securitytracker.com/id/1040749</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-8043">https://access.redhat.com/security/cve/CVE-2018-8043</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043</a><br><a href="https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5">https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5</a><br><a href="https://linux.oracle.com/cve/CVE-2018-8043.html">https://linux.oracle.com/cve/CVE-2018-8043.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-4509.html">https://linux.oracle.com/errata/ELSA-2019-4509.html</a><br><a href="https://ubuntu.com/security/notices/USN-3619-1">https://ubuntu.com/security/notices/USN-3619-1</a><br><a href="https://ubuntu.com/security/notices/USN-3619-2">https://ubuntu.com/security/notices/USN-3619-2</a><br><a href="https://ubuntu.com/security/notices/USN-3630-1">https://ubuntu.com/security/notices/USN-3630-1</a><br><a href="https://ubuntu.com/security/notices/USN-3630-2">https://ubuntu.com/security/notices/USN-3630-2</a><br><a href="https://ubuntu.com/security/notices/USN-3632-1">https://ubuntu.com/security/notices/USN-3632-1</a><br><a href="https://usn.ubuntu.com/3619-1/">https://usn.ubuntu.com/3619-1/</a><br><a href="https://usn.ubuntu.com/3619-2/">https://usn.ubuntu.com/3619-2/</a><br><a href="https://usn.ubuntu.com/3630-1/">https://usn.ubuntu.com/3630-1/</a><br><a href="https://usn.ubuntu.com/3630-2/">https://usn.ubuntu.com/3630-2/</a><br><a href="https://usn.ubuntu.com/3632-1/">https://usn.ubuntu.com/3632-1/</a><br></details> |
| linux-libc-dev | CVE-2019-11191 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/04/18/5">http://www.openwall.com/lists/oss-security/2019/04/18/5</a><br><a href="http://www.openwall.com/lists/oss-security/2019/05/22/7">http://www.openwall.com/lists/oss-security/2019/05/22/7</a><br><a href="http://www.securityfocus.com/bid/107887">http://www.securityfocus.com/bid/107887</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11191">https://access.redhat.com/security/cve/CVE-2019-11191</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191</a><br><a href="https://ubuntu.com/security/notices/USN-4006-1">https://ubuntu.com/security/notices/USN-4006-1</a><br><a href="https://ubuntu.com/security/notices/USN-4006-2">https://ubuntu.com/security/notices/USN-4006-2</a><br><a href="https://ubuntu.com/security/notices/USN-4007-1">https://ubuntu.com/security/notices/USN-4007-1</a><br><a href="https://ubuntu.com/security/notices/USN-4007-2">https://ubuntu.com/security/notices/USN-4007-2</a><br><a href="https://ubuntu.com/security/notices/USN-4008-1">https://ubuntu.com/security/notices/USN-4008-1</a><br><a href="https://ubuntu.com/security/notices/USN-4008-3">https://ubuntu.com/security/notices/USN-4008-3</a><br><a href="https://usn.ubuntu.com/4006-1/">https://usn.ubuntu.com/4006-1/</a><br><a href="https://usn.ubuntu.com/4006-2/">https://usn.ubuntu.com/4006-2/</a><br><a href="https://usn.ubuntu.com/4007-1/">https://usn.ubuntu.com/4007-1/</a><br><a href="https://usn.ubuntu.com/4007-2/">https://usn.ubuntu.com/4007-2/</a><br><a href="https://usn.ubuntu.com/4008-1/">https://usn.ubuntu.com/4008-1/</a><br><a href="https://usn.ubuntu.com/4008-3/">https://usn.ubuntu.com/4008-3/</a><br><a href="https://www.openwall.com/lists/oss-security/2019/04/03/4">https://www.openwall.com/lists/oss-security/2019/04/03/4</a><br><a href="https://www.openwall.com/lists/oss-security/2019/04/03/4/1">https://www.openwall.com/lists/oss-security/2019/04/03/4/1</a><br></details> |
| linux-libc-dev | CVE-2019-12378 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108475">http://www.securityfocus.com/bid/108475</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12378">https://access.redhat.com/security/cve/CVE-2019-12378</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825">https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12378.html">https://linux.oracle.com/cve/CVE-2019-12378.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-4746.html">https://linux.oracle.com/errata/ELSA-2019-4746.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/</a><br><a href="https://lkml.org/lkml/2019/5/25/229">https://lkml.org/lkml/2019/5/25/229</a><br></details> |
| linux-libc-dev | CVE-2019-12379 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108478">http://www.securityfocus.com/bid/108478</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12379">https://access.redhat.com/security/cve/CVE-2019-12379</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&amp;id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac">https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&amp;id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&amp;id=15b3cd8ef46ad1b100e0d3c7e38774f330726820">https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&amp;id=15b3cd8ef46ad1b100e0d3c7e38774f330726820</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/</a><br><a href="https://security.netapp.com/advisory/ntap-20190710-0002/">https://security.netapp.com/advisory/ntap-20190710-0002/</a><br></details> |
| linux-libc-dev | CVE-2019-12380 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html</a><br><a href="http://www.securityfocus.com/bid/108477">http://www.securityfocus.com/bid/108477</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12380">https://access.redhat.com/security/cve/CVE-2019-12380</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e">https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12380.html">https://linux.oracle.com/cve/CVE-2019-12380.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5913.html">https://linux.oracle.com/errata/ELSA-2020-5913.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/</a><br><a href="https://security.netapp.com/advisory/ntap-20190710-0002/">https://security.netapp.com/advisory/ntap-20190710-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4414-1">https://ubuntu.com/security/notices/USN-4414-1</a><br><a href="https://ubuntu.com/security/notices/USN-4427-1">https://ubuntu.com/security/notices/USN-4427-1</a><br><a href="https://ubuntu.com/security/notices/USN-4439-1">https://ubuntu.com/security/notices/USN-4439-1</a><br><a href="https://usn.ubuntu.com/4414-1/">https://usn.ubuntu.com/4414-1/</a><br><a href="https://usn.ubuntu.com/4427-1/">https://usn.ubuntu.com/4427-1/</a><br><a href="https://usn.ubuntu.com/4439-1/">https://usn.ubuntu.com/4439-1/</a><br></details> |
| linux-libc-dev | CVE-2019-12381 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108473">http://www.securityfocus.com/bid/108473</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12381">https://access.redhat.com/security/cve/CVE-2019-12381</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1715501">https://bugzilla.redhat.com/show_bug.cgi?id=1715501</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515">https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12381.html">https://linux.oracle.com/cve/CVE-2019-12381.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-4746.html">https://linux.oracle.com/errata/ELSA-2019-4746.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/</a><br><a href="https://lkml.org/lkml/2019/5/25/230">https://lkml.org/lkml/2019/5/25/230</a><br></details> |
| linux-libc-dev | CVE-2019-12382 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html</a><br><a href="http://www.securityfocus.com/bid/108474">http://www.securityfocus.com/bid/108474</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12382">https://access.redhat.com/security/cve/CVE-2019-12382</a><br><a href="https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f">https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f</a><br><a href="https://linux.oracle.com/cve/CVE-2019-12382.html">https://linux.oracle.com/cve/CVE-2019-12382.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1016.html">https://linux.oracle.com/errata/ELSA-2020-1016.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/</a><br><a href="https://lkml.org/lkml/2019/5/24/843">https://lkml.org/lkml/2019/5/24/843</a><br><a href="https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/">https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/</a><br><a href="https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382">https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382</a><br></details> |
| linux-libc-dev | CVE-2019-12455 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-12455">https://access.redhat.com/security/cve/CVE-2019-12455</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&amp;id=fcdf445ff42f036d22178b49cf64e92d527c1330">https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&amp;id=fcdf445ff42f036d22178b49cf64e92d527c1330</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/</a><br><a href="https://security.netapp.com/advisory/ntap-20190710-0002/">https://security.netapp.com/advisory/ntap-20190710-0002/</a><br><a href="https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html">https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html</a><br></details> |
| linux-libc-dev | CVE-2019-12456 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12456">https://access.redhat.com/security/cve/CVE-2019-12456</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1717182">https://bugzilla.redhat.com/show_bug.cgi?id=1717182</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&amp;id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e">https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&amp;id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/</a><br><a href="https://lkml.org/lkml/2019/5/29/1164">https://lkml.org/lkml/2019/5/29/1164</a><br><a href="https://support.f5.com/csp/article/K84310302">https://support.f5.com/csp/article/K84310302</a><br><a href="https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| linux-libc-dev | CVE-2019-12615 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108549">http://www.securityfocus.com/bid/108549</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-12615">https://access.redhat.com/security/cve/CVE-2019-12615</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f">https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f</a><br><a href="https://security.netapp.com/advisory/ntap-20190710-0002/">https://security.netapp.com/advisory/ntap-20190710-0002/</a><br><a href="https://support.f5.com/csp/article/K60924046">https://support.f5.com/csp/article/K60924046</a><br><a href="https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html">https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html</a><br></details> |
| linux-libc-dev | CVE-2019-16229 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-16229">https://access.redhat.com/security/cve/CVE-2019-16229</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3">https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229</a><br><a href="https://lkml.org/lkml/2019/9/9/487">https://lkml.org/lkml/2019/9/9/487</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0001/">https://security.netapp.com/advisory/ntap-20191004-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4284-1">https://ubuntu.com/security/notices/USN-4284-1</a><br><a href="https://ubuntu.com/security/notices/USN-4285-1">https://ubuntu.com/security/notices/USN-4285-1</a><br><a href="https://ubuntu.com/security/notices/USN-4287-1">https://ubuntu.com/security/notices/USN-4287-1</a><br><a href="https://ubuntu.com/security/notices/USN-4287-2">https://ubuntu.com/security/notices/USN-4287-2</a><br><a href="https://usn.ubuntu.com/4284-1/">https://usn.ubuntu.com/4284-1/</a><br><a href="https://usn.ubuntu.com/4285-1/">https://usn.ubuntu.com/4285-1/</a><br><a href="https://usn.ubuntu.com/4287-1/">https://usn.ubuntu.com/4287-1/</a><br><a href="https://usn.ubuntu.com/4287-2/">https://usn.ubuntu.com/4287-2/</a><br></details> |
| linux-libc-dev | CVE-2019-16230 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-16230">https://access.redhat.com/security/cve/CVE-2019-16230</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1150468">https://bugzilla.suse.com/show_bug.cgi?id=1150468</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230</a><br><a href="https://lkml.org/lkml/2019/9/9/487">https://lkml.org/lkml/2019/9/9/487</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0001/">https://security.netapp.com/advisory/ntap-20191004-0001/</a><br></details> |
| linux-libc-dev | CVE-2019-16231 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16231">https://access.redhat.com/security/cve/CVE-2019-16231</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16231.html">https://linux.oracle.com/cve/CVE-2019-16231.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5533.html">https://linux.oracle.com/errata/ELSA-2020-5533.html</a><br><a href="https://lkml.org/lkml/2019/9/9/487">https://lkml.org/lkml/2019/9/9/487</a><br><a href="https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/">https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0001/">https://security.netapp.com/advisory/ntap-20191004-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4225-1">https://ubuntu.com/security/notices/USN-4225-1</a><br><a href="https://ubuntu.com/security/notices/USN-4225-2">https://ubuntu.com/security/notices/USN-4225-2</a><br><a href="https://ubuntu.com/security/notices/USN-4226-1">https://ubuntu.com/security/notices/USN-4226-1</a><br><a href="https://ubuntu.com/security/notices/USN-4227-1">https://ubuntu.com/security/notices/USN-4227-1</a><br><a href="https://ubuntu.com/security/notices/USN-4227-2">https://ubuntu.com/security/notices/USN-4227-2</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://usn.ubuntu.com/4225-1/">https://usn.ubuntu.com/4225-1/</a><br><a href="https://usn.ubuntu.com/4225-2/">https://usn.ubuntu.com/4225-2/</a><br><a href="https://usn.ubuntu.com/4226-1/">https://usn.ubuntu.com/4226-1/</a><br><a href="https://usn.ubuntu.com/4227-1/">https://usn.ubuntu.com/4227-1/</a><br><a href="https://usn.ubuntu.com/4227-2/">https://usn.ubuntu.com/4227-2/</a><br></details> |
| linux-libc-dev | CVE-2019-16232 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16232">https://access.redhat.com/security/cve/CVE-2019-16232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16232.html">https://linux.oracle.com/cve/CVE-2019-16232.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5804.html">https://linux.oracle.com/errata/ELSA-2020-5804.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/</a><br><a href="https://lkml.org/lkml/2019/9/9/487">https://lkml.org/lkml/2019/9/9/487</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0001/">https://security.netapp.com/advisory/ntap-20191004-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4284-1">https://ubuntu.com/security/notices/USN-4284-1</a><br><a href="https://ubuntu.com/security/notices/USN-4285-1">https://ubuntu.com/security/notices/USN-4285-1</a><br><a href="https://ubuntu.com/security/notices/USN-4287-1">https://ubuntu.com/security/notices/USN-4287-1</a><br><a href="https://ubuntu.com/security/notices/USN-4287-2">https://ubuntu.com/security/notices/USN-4287-2</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://usn.ubuntu.com/4284-1/">https://usn.ubuntu.com/4284-1/</a><br><a href="https://usn.ubuntu.com/4285-1/">https://usn.ubuntu.com/4285-1/</a><br><a href="https://usn.ubuntu.com/4287-1/">https://usn.ubuntu.com/4287-1/</a><br><a href="https://usn.ubuntu.com/4287-2/">https://usn.ubuntu.com/4287-2/</a><br></details> |
| linux-libc-dev | CVE-2019-16233 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16233">https://access.redhat.com/security/cve/CVE-2019-16233</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16233.html">https://linux.oracle.com/cve/CVE-2019-16233.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5508.html">https://linux.oracle.com/errata/ELSA-2020-5508.html</a><br><a href="https://lkml.org/lkml/2019/9/9/487">https://lkml.org/lkml/2019/9/9/487</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0001/">https://security.netapp.com/advisory/ntap-20191004-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4226-1">https://ubuntu.com/security/notices/USN-4226-1</a><br><a href="https://ubuntu.com/security/notices/USN-4227-1">https://ubuntu.com/security/notices/USN-4227-1</a><br><a href="https://ubuntu.com/security/notices/USN-4227-2">https://ubuntu.com/security/notices/USN-4227-2</a><br><a href="https://ubuntu.com/security/notices/USN-4346-1">https://ubuntu.com/security/notices/USN-4346-1</a><br><a href="https://usn.ubuntu.com/4226-1/">https://usn.ubuntu.com/4226-1/</a><br><a href="https://usn.ubuntu.com/4227-1/">https://usn.ubuntu.com/4227-1/</a><br><a href="https://usn.ubuntu.com/4227-2/">https://usn.ubuntu.com/4227-2/</a><br><a href="https://usn.ubuntu.com/4346-1/">https://usn.ubuntu.com/4346-1/</a><br></details> |
| linux-libc-dev | CVE-2019-16234 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16234">https://access.redhat.com/security/cve/CVE-2019-16234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16234.html">https://linux.oracle.com/cve/CVE-2019-16234.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5804.html">https://linux.oracle.com/errata/ELSA-2020-5804.html</a><br><a href="https://lkml.org/lkml/2019/9/9/487">https://lkml.org/lkml/2019/9/9/487</a><br><a href="https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/">https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0001/">https://security.netapp.com/advisory/ntap-20191004-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4342-1">https://ubuntu.com/security/notices/USN-4342-1</a><br><a href="https://ubuntu.com/security/notices/USN-4344-1">https://ubuntu.com/security/notices/USN-4344-1</a><br><a href="https://ubuntu.com/security/notices/USN-4345-1">https://ubuntu.com/security/notices/USN-4345-1</a><br><a href="https://ubuntu.com/security/notices/USN-4346-1">https://ubuntu.com/security/notices/USN-4346-1</a><br><a href="https://usn.ubuntu.com/4342-1/">https://usn.ubuntu.com/4342-1/</a><br><a href="https://usn.ubuntu.com/4344-1/">https://usn.ubuntu.com/4344-1/</a><br><a href="https://usn.ubuntu.com/4345-1/">https://usn.ubuntu.com/4345-1/</a><br><a href="https://usn.ubuntu.com/4346-1/">https://usn.ubuntu.com/4346-1/</a><br></details> |
| linux-libc-dev | CVE-2019-18808 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/14/1">http://www.openwall.com/lists/oss-security/2021/09/14/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18808">https://access.redhat.com/security/cve/CVE-2019-18808</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808</a><br><a href="https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2">https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2</a><br><a href="https://linux.oracle.com/cve/CVE-2019-18808.html">https://linux.oracle.com/cve/CVE-2019-18808.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4431.html">https://linux.oracle.com/errata/ELSA-2020-4431.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/</a><br><a href="https://security.netapp.com/advisory/ntap-20191205-0001/">https://security.netapp.com/advisory/ntap-20191205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4525-1">https://ubuntu.com/security/notices/USN-4525-1</a><br><a href="https://ubuntu.com/security/notices/USN-4526-1">https://ubuntu.com/security/notices/USN-4526-1</a><br><a href="https://usn.ubuntu.com/4525-1/">https://usn.ubuntu.com/4525-1/</a><br><a href="https://usn.ubuntu.com/4526-1/">https://usn.ubuntu.com/4526-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19046 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19046">https://access.redhat.com/security/cve/CVE-2019-19046</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1157304">https://bugzilla.suse.com/show_bug.cgi?id=1157304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046</a><br><a href="https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab">https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19046.html">https://linux.oracle.com/cve/CVE-2019-19046.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4431.html">https://linux.oracle.com/errata/ELSA-2020-4431.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/</a><br><a href="https://ubuntu.com/security/notices/USN-4302-1">https://ubuntu.com/security/notices/USN-4302-1</a><br><a href="https://ubuntu.com/security/notices/USN-4319-1">https://ubuntu.com/security/notices/USN-4319-1</a><br><a href="https://ubuntu.com/security/notices/USN-4325-1">https://ubuntu.com/security/notices/USN-4325-1</a><br><a href="https://usn.ubuntu.com/4302-1/">https://usn.ubuntu.com/4302-1/</a><br><a href="https://usn.ubuntu.com/4319-1/">https://usn.ubuntu.com/4319-1/</a><br><a href="https://usn.ubuntu.com/4325-1/">https://usn.ubuntu.com/4325-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19054 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19054">https://access.redhat.com/security/cve/CVE-2019-19054</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054</a><br><a href="https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177">https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19054.html">https://linux.oracle.com/cve/CVE-2019-19054.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5878.html">https://linux.oracle.com/errata/ELSA-2020-5878.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/</a><br><a href="https://security.netapp.com/advisory/ntap-20191205-0001/">https://security.netapp.com/advisory/ntap-20191205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4525-1">https://ubuntu.com/security/notices/USN-4525-1</a><br><a href="https://ubuntu.com/security/notices/USN-4526-1">https://ubuntu.com/security/notices/USN-4526-1</a><br><a href="https://ubuntu.com/security/notices/USN-4527-1">https://ubuntu.com/security/notices/USN-4527-1</a><br><a href="https://usn.ubuntu.com/4525-1/">https://usn.ubuntu.com/4525-1/</a><br><a href="https://usn.ubuntu.com/4526-1/">https://usn.ubuntu.com/4526-1/</a><br><a href="https://usn.ubuntu.com/4527-1/">https://usn.ubuntu.com/4527-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19060 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19060">https://access.redhat.com/security/cve/CVE-2019-19060</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060</a><br><a href="https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0">https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0</a><br><a href="https://security.netapp.com/advisory/ntap-20191205-0001/">https://security.netapp.com/advisory/ntap-20191205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4208-1">https://ubuntu.com/security/notices/USN-4208-1</a><br><a href="https://ubuntu.com/security/notices/USN-4210-1">https://ubuntu.com/security/notices/USN-4210-1</a><br><a href="https://ubuntu.com/security/notices/USN-4226-1">https://ubuntu.com/security/notices/USN-4226-1</a><br><a href="https://ubuntu.com/security/notices/USN-4364-1">https://ubuntu.com/security/notices/USN-4364-1</a><br><a href="https://usn.ubuntu.com/4208-1/">https://usn.ubuntu.com/4208-1/</a><br><a href="https://usn.ubuntu.com/4210-1/">https://usn.ubuntu.com/4210-1/</a><br><a href="https://usn.ubuntu.com/4226-1/">https://usn.ubuntu.com/4226-1/</a><br><a href="https://usn.ubuntu.com/4364-1/">https://usn.ubuntu.com/4364-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19061 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19061">https://access.redhat.com/security/cve/CVE-2019-19061</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061</a><br><a href="https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873">https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873</a><br><a href="https://security.netapp.com/advisory/ntap-20191205-0001/">https://security.netapp.com/advisory/ntap-20191205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4208-1">https://ubuntu.com/security/notices/USN-4208-1</a><br><a href="https://ubuntu.com/security/notices/USN-4526-1">https://ubuntu.com/security/notices/USN-4526-1</a><br><a href="https://ubuntu.com/security/notices/USN-4904-1">https://ubuntu.com/security/notices/USN-4904-1</a><br><a href="https://usn.ubuntu.com/4208-1/">https://usn.ubuntu.com/4208-1/</a><br><a href="https://usn.ubuntu.com/4526-1/">https://usn.ubuntu.com/4526-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19064 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19064">https://access.redhat.com/security/cve/CVE-2019-19064</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1157300">https://bugzilla.suse.com/show_bug.cgi?id=1157300</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064</a><br><a href="https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86">https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/</a><br><a href="https://ubuntu.com/security/notices/USN-4300-1">https://ubuntu.com/security/notices/USN-4300-1</a><br><a href="https://usn.ubuntu.com/4300-1/">https://usn.ubuntu.com/4300-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19067 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19067">https://access.redhat.com/security/cve/CVE-2019-19067</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1157180">https://bugzilla.suse.com/show_bug.cgi?id=1157180</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067</a><br><a href="https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725">https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725</a><br><a href="https://ubuntu.com/security/notices/USN-4208-1">https://ubuntu.com/security/notices/USN-4208-1</a><br><a href="https://ubuntu.com/security/notices/USN-4226-1">https://ubuntu.com/security/notices/USN-4226-1</a><br><a href="https://ubuntu.com/security/notices/USN-4526-1">https://ubuntu.com/security/notices/USN-4526-1</a><br><a href="https://usn.ubuntu.com/4208-1/">https://usn.ubuntu.com/4208-1/</a><br><a href="https://usn.ubuntu.com/4226-1/">https://usn.ubuntu.com/4226-1/</a><br><a href="https://usn.ubuntu.com/4526-1/">https://usn.ubuntu.com/4526-1/</a><br></details> |
| linux-libc-dev | CVE-2019-19070 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19070">https://access.redhat.com/security/cve/CVE-2019-19070</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1157294">https://bugzilla.suse.com/show_bug.cgi?id=1157294</a><br><a href="https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d">https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/</a><br></details> |
| linux-libc-dev | CVE-2019-19075 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-19075">https://access.redhat.com/security/cve/CVE-2019-19075</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075</a><br><a href="https://github.com/torvalds/linux/commit/6402939ec86eaf226c8b8ae00ed983936b164908">https://github.com/torvalds/linux/commit/6402939ec86eaf226c8b8ae00ed983936b164908</a><br><a href="https://security.netapp.com/advisory/ntap-20191205-0001/">https://security.netapp.com/advisory/ntap-20191205-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4208-1">https://ubuntu.com/security/notices/USN-4208-1</a><br><a href="https://ubuntu.com/security/notices/USN-4210-1">https://ubuntu.com/security/notices/USN-4210-1</a><br><a href="https://ubuntu.com/security/notices/USN-4226-1">https://ubuntu.com/security/notices/USN-4226-1</a><br><a href="https://usn.ubuntu.com/4208-1/">https://usn.ubuntu.com/4208-1/</a><br><a href="https://usn.ubuntu.com/4210-1/">https://usn.ubuntu.com/4210-1/</a><br><a href="https://usn.ubuntu.com/4226-1/">https://usn.ubuntu.com/4226-1/</a><br></details> |
| linux-libc-dev | CVE-2020-11725 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11725">https://access.redhat.com/security/cve/CVE-2020-11725</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725</a><br><a href="https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474">https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474</a><br><a href="https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/">https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11725">https://nvd.nist.gov/vuln/detail/CVE-2020-11725</a><br><a href="https://twitter.com/yabbadabbadrew/status/1248632267028582400">https://twitter.com/yabbadabbadrew/status/1248632267028582400</a><br></details> |
| linux-libc-dev | CVE-2020-24586 | LOW | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-24586">https://access.redhat.com/security/cve/CVE-2020-24586</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-24586.html">https://linux.oracle.com/cve/CVE-2020-24586.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63">https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html</a><br></details> |
| linux-libc-dev | CVE-2020-24587 | LOW | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-24587">https://access.redhat.com/security/cve/CVE-2020-24587</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-24587.html">https://linux.oracle.com/cve/CVE-2020-24587.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://ubuntu.com/security/notices/USN-5018-1">https://ubuntu.com/security/notices/USN-5018-1</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63">https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html</a><br></details> |
| linux-libc-dev | CVE-2020-24588 | LOW | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/05/11/12">http://www.openwall.com/lists/oss-security/2021/05/11/12</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-24588">https://access.redhat.com/security/cve/CVE-2020-24588</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588</a><br><a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md">https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md</a><br><a href="https://linux.oracle.com/cve/CVE-2020-24588.html">https://linux.oracle.com/cve/CVE-2020-24588.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9459.html">https://linux.oracle.com/errata/ELSA-2021-9459.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/">https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/</a><br><a href="https://papers.mathyvanhoef.com/usenix2021.pdf">https://papers.mathyvanhoef.com/usenix2021.pdf</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a><br><a href="https://ubuntu.com/security/notices/USN-4997-1">https://ubuntu.com/security/notices/USN-4997-1</a><br><a href="https://ubuntu.com/security/notices/USN-4997-2">https://ubuntu.com/security/notices/USN-4997-2</a><br><a href="https://ubuntu.com/security/notices/USN-4999-1">https://ubuntu.com/security/notices/USN-4999-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-1">https://ubuntu.com/security/notices/USN-5000-1</a><br><a href="https://ubuntu.com/security/notices/USN-5000-2">https://ubuntu.com/security/notices/USN-5000-2</a><br><a href="https://ubuntu.com/security/notices/USN-5001-1">https://ubuntu.com/security/notices/USN-5001-1</a><br><a href="https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63">https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63</a><br><a href="https://www.fragattacks.com">https://www.fragattacks.com</a><br><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html</a><br></details> |
| linux-libc-dev | CVE-2020-27820 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27820">https://access.redhat.com/security/cve/CVE-2020-27820</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1901726">https://bugzilla.redhat.com/show_bug.cgi?id=1901726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820</a><br><a href="https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/">https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/</a><br><a href="https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/">https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/</a><br><a href="https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/">https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/</a><br><a href="https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/">https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://ubuntu.com/security/notices/USN-5278-1">https://ubuntu.com/security/notices/USN-5278-1</a><br></details> |
| linux-libc-dev | CVE-2020-29374 | LOW | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html">http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-29374">https://access.redhat.com/security/cve/CVE-2020-29374</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2045">https://bugs.chromium.org/p/project-zero/issues/detail?id=2045</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374</a><br><a href="https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f">https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29374">https://nvd.nist.gov/vuln/detail/CVE-2020-29374</a><br><a href="https://security.netapp.com/advisory/ntap-20210115-0002/">https://security.netapp.com/advisory/ntap-20210115-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4748-1">https://ubuntu.com/security/notices/USN-4748-1</a><br><a href="https://ubuntu.com/security/notices/USN-4749-1">https://ubuntu.com/security/notices/USN-4749-1</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br></details> |
| linux-libc-dev | CVE-2020-35501 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-35501">https://access.redhat.com/security/cve/CVE-2020-35501</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1908577">https://bugzilla.redhat.com/show_bug.cgi?id=1908577</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501</a><br><a href="https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html">https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/18/1">https://www.openwall.com/lists/oss-security/2021/02/18/1</a><br></details> |
| linux-libc-dev | CVE-2021-0929 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-0929">https://access.redhat.com/security/cve/CVE-2021-0929</a><br><a href="https://source.android.com/security/bulletin/2021-11-01">https://source.android.com/security/bulletin/2021-11-01</a><br></details> |
| linux-libc-dev | CVE-2021-21781 | LOW | 4.9.246-2 | 4.9.272-2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21781">https://access.redhat.com/security/cve/CVE-2021-21781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21781</a><br><a href="https://git.kernel.org/linus/9c698bff66ab4914bb3d71da7dc6112519bde23e">https://git.kernel.org/linus/9c698bff66ab4914bb3d71da7dc6112519bde23e</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243">https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243</a><br></details> |
| linux-libc-dev | CVE-2021-32078 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32078">https://access.redhat.com/security/cve/CVE-2021-32078</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)">https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)</a><br><a href="https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f">https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://kirtikumarar.com/CVE-2021-32078.txt">https://kirtikumarar.com/CVE-2021-32078.txt</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32078">https://nvd.nist.gov/vuln/detail/CVE-2021-32078</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0002/">https://security.netapp.com/advisory/ntap-20210813-0002/</a><br></details> |
| linux-libc-dev | CVE-2021-3655 | LOW | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3655">https://access.redhat.com/security/cve/CVE-2021-3655</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1984024">https://bugzilla.redhat.com/show_bug.cgi?id=1984024</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3655.html">https://linux.oracle.com/cve/CVE-2021-3655.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9488.html">https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/">https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/</a><br><a href="https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/">https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">https://nvd.nist.gov/vuln/detail/CVE-2021-3655</a><br><a href="https://ubuntu.com/security/notices/USN-5136-1">https://ubuntu.com/security/notices/USN-5136-1</a><br><a href="https://ubuntu.com/security/notices/USN-5139-1">https://ubuntu.com/security/notices/USN-5139-1</a><br><a href="https://ubuntu.com/security/notices/USN-5161-1">https://ubuntu.com/security/notices/USN-5161-1</a><br><a href="https://ubuntu.com/security/notices/USN-5162-1">https://ubuntu.com/security/notices/USN-5162-1</a><br><a href="https://ubuntu.com/security/notices/USN-5163-1">https://ubuntu.com/security/notices/USN-5163-1</a><br></details> |
| linux-libc-dev | CVE-2021-38205 | LOW | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38205">https://access.redhat.com/security/cve/CVE-2021-38205</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205</a><br><a href="https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37">https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">https://nvd.nist.gov/vuln/detail/CVE-2021-38205</a><br><a href="https://ubuntu.com/security/notices/USN-5092-1">https://ubuntu.com/security/notices/USN-5092-1</a><br><a href="https://ubuntu.com/security/notices/USN-5092-2">https://ubuntu.com/security/notices/USN-5092-2</a><br><a href="https://ubuntu.com/security/notices/USN-5094-1">https://ubuntu.com/security/notices/USN-5094-1</a><br><a href="https://ubuntu.com/security/notices/USN-5094-2">https://ubuntu.com/security/notices/USN-5094-2</a><br><a href="https://ubuntu.com/security/notices/USN-5096-1">https://ubuntu.com/security/notices/USN-5096-1</a><br><a href="https://ubuntu.com/security/notices/USN-5115-1">https://ubuntu.com/security/notices/USN-5115-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-1">https://ubuntu.com/security/notices/USN-5116-1</a><br><a href="https://ubuntu.com/security/notices/USN-5116-2">https://ubuntu.com/security/notices/USN-5116-2</a><br></details> |
| linux-libc-dev | CVE-2021-38209 | LOW | 4.9.246-2 | 4.9.272-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-38209">https://access.redhat.com/security/cve/CVE-2021-38209</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38209">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38209</a><br><a href="https://github.com/torvalds/linux/commit/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6">https://github.com/torvalds/linux/commit/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38209">https://nvd.nist.gov/vuln/detail/CVE-2021-38209</a><br></details> |
| linux-libc-dev | CVE-2021-45486 | LOW | 4.9.246-2 | 4.9.290-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45486">https://access.redhat.com/security/cve/CVE-2021-45486</a><br><a href="https://arxiv.org/pdf/2112.09604.pdf">https://arxiv.org/pdf/2112.09604.pdf</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486</a><br><a href="https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1)">https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">https://nvd.nist.gov/vuln/detail/CVE-2021-45486</a><br></details> |
| linux-libc-dev | CVE-2022-24448 | LOW | 4.9.246-2 | 4.9.303-1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24448">https://access.redhat.com/security/cve/CVE-2022-24448</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf</a><br><a href="https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf">https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">https://nvd.nist.gov/vuln/detail/CVE-2022-24448</a><br><a href="https://ubuntu.com/security/notices/USN-5302-1">https://ubuntu.com/security/notices/USN-5302-1</a><br><a href="https://www.debian.org/security/2022/dsa-5092">https://www.debian.org/security/2022/dsa-5092</a><br><a href="https://www.debian.org/security/2022/dsa-5096">https://www.debian.org/security/2022/dsa-5096</a><br><a href="https://www.spinics.net/lists/stable/msg531976.html">https://www.spinics.net/lists/stable/msg531976.html</a><br></details> |
| linux-libc-dev | CVE-2022-25265 | LOW | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-25265">https://access.redhat.com/security/cve/CVE-2022-25265</a><br><a href="https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294">https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294</a><br><a href="https://github.com/x0reaxeax/exec-prot-bypass">https://github.com/x0reaxeax/exec-prot-bypass</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25265">https://nvd.nist.gov/vuln/detail/CVE-2022-25265</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0005/">https://security.netapp.com/advisory/ntap-20220318-0005/</a><br></details> |
| linux-libc-dev | CVE-2021-3894 | UNKNOWN | 4.9.246-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3894">https://access.redhat.com/security/cve/CVE-2021-3894</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c</a><br></details> |
| login | CVE-2017-12424 | CRITICAL | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12424">https://access.redhat.com/security/cve/CVE-2017-12424</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675</a><br><a href="https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952">https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html</a><br><a href="https://security.gentoo.org/glsa/201710-16">https://security.gentoo.org/glsa/201710-16</a><br></details> |
| login | CVE-2017-20002 | HIGH | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | <details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html</a><br></details> |
| login | CVE-2007-5686 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| login | CVE-2018-7169 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| login | CVE-2019-19882 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| m4 | CVE-2008-1687 | LOW | 1.4.18-1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/29671">http://secunia.com/advisories/29671</a><br><a href="http://secunia.com/advisories/29729">http://secunia.com/advisories/29729</a><br><a href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.510612">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.510612</a><br><a href="http://www.openwall.com/lists/oss-security/2008/04/07/1">http://www.openwall.com/lists/oss-security/2008/04/07/1</a><br><a href="http://www.openwall.com/lists/oss-security/2008/04/07/12">http://www.openwall.com/lists/oss-security/2008/04/07/12</a><br><a href="http://www.openwall.com/lists/oss-security/2008/04/07/3">http://www.openwall.com/lists/oss-security/2008/04/07/3</a><br><a href="http://www.openwall.com/lists/oss-security/2008/04/07/4">http://www.openwall.com/lists/oss-security/2008/04/07/4</a><br><a href="http://www.securityfocus.com/bid/28688">http://www.securityfocus.com/bid/28688</a><br><a href="http://www.vupen.com/english/advisories/2008/1151/references">http://www.vupen.com/english/advisories/2008/1151/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-1687">https://access.redhat.com/security/cve/CVE-2008-1687</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/41706">https://exchange.xforce.ibmcloud.com/vulnerabilities/41706</a><br></details> |
| m4 | CVE-2008-1688 | LOW | 1.4.18-1 | | <details><summary>Expand...</summary><a href="http://osvdb.org/44272">http://osvdb.org/44272</a><br><a href="http://secunia.com/advisories/29671">http://secunia.com/advisories/29671</a><br><a href="http://secunia.com/advisories/29729">http://secunia.com/advisories/29729</a><br><a href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.510612">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.510612</a><br><a href="http://www.openwall.com/lists/oss-security/2008/04/07/1">http://www.openwall.com/lists/oss-security/2008/04/07/1</a><br><a href="http://www.openwall.com/lists/oss-security/2008/04/07/3">http://www.openwall.com/lists/oss-security/2008/04/07/3</a><br><a href="http://www.securityfocus.com/bid/28688">http://www.securityfocus.com/bid/28688</a><br><a href="http://www.vupen.com/english/advisories/2008/1151/references">http://www.vupen.com/english/advisories/2008/1151/references</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-1688">https://access.redhat.com/security/cve/CVE-2008-1688</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/41704">https://exchange.xforce.ibmcloud.com/vulnerabilities/41704</a><br></details> |
| mercurial | CVE-2018-17983 | LOW | 4.0-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17983">https://access.redhat.com/security/cve/CVE-2018-17983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17983">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17983</a><br><a href="https://ubuntu.com/security/notices/USN-5102-1">https://ubuntu.com/security/notices/USN-5102-1</a><br><a href="https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901">https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901</a><br><a href="https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.7.2_.282018-10-01.29">https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.7.2_.282018-10-01.29</a><br></details> |
| mercurial-common | CVE-2018-17983 | LOW | 4.0-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-17983">https://access.redhat.com/security/cve/CVE-2018-17983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17983">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17983</a><br><a href="https://ubuntu.com/security/notices/USN-5102-1">https://ubuntu.com/security/notices/USN-5102-1</a><br><a href="https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901">https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901</a><br><a href="https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.7.2_.282018-10-01.29">https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.7.2_.282018-10-01.29</a><br></details> |
| mount | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| mount | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| mount | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| multiarch-support | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/878159">http://bugs.debian.org/878159</a><br><a href="http://www.securityfocus.com/bid/102912">http://www.securityfocus.com/bid/102912</a><br><a href="https://access.redhat.com/errata/RHBA-2019:0327">https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href="https://access.redhat.com/errata/RHSA-2018:3092">https://access.redhat.com/errata/RHSA-2018:3092</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6485">https://access.redhat.com/security/cve/CVE-2018-6485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485</a><br><a href="https://linux.oracle.com/cve/CVE-2018-6485.html">https://linux.oracle.com/cve/CVE-2018-6485.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-3092.html">https://linux.oracle.com/errata/ELSA-2018-3092.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22343">https://sourceware.org/bugzilla/show_bug.cgi?id=22343</a><br><a href="https://ubuntu.com/security/notices/USN-4218-1">https://ubuntu.com/security/notices/USN-4218-1</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4218-1/">https://usn.ubuntu.com/4218-1/</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a><br></details> |
| multiarch-support | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6551">https://access.redhat.com/security/cve/CVE-2018-6551</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22774">https://sourceware.org/bugzilla/show_bug.cgi?id=22774</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22">https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22</a><br></details> |
| multiarch-support | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9169">https://access.redhat.com/security/cve/CVE-2019-9169</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10278</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9169.html">https://linux.oracle.com/cve/CVE-2019-9169.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">https://nvd.nist.gov/vuln/detail/CVE-2019-9169</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24114">https://sourceware.org/bugzilla/show_bug.cgi?id=24114</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9</a><br><a href="https://support.f5.com/csp/article/K54823184">https://support.f5.com/csp/article/K54823184</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| multiarch-support | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| multiarch-support | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| multiarch-support | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| multiarch-support | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| multiarch-support | CVE-2009-5155 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272">http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272</a><br><a href="https://access.redhat.com/security/cve/CVE-2009-5155">https://access.redhat.com/security/cve/CVE-2009-5155</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=11053">https://sourceware.org/bugzilla/show_bug.cgi?id=11053</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18986">https://sourceware.org/bugzilla/show_bug.cgi?id=18986</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672</a><br><a href="https://support.f5.com/csp/article/K64119434">https://support.f5.com/csp/article/K64119434</a><br><a href="https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br></details> |
| multiarch-support | CVE-2018-1000001 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q1/38">http://seclists.org/oss-sec/2018/q1/38</a><br><a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a><br><a href="http://www.securityfocus.com/bid/102525">http://www.securityfocus.com/bid/102525</a><br><a href="http://www.securitytracker.com/id/1040162">http://www.securitytracker.com/id/1040162</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000001">https://access.redhat.com/security/cve/CVE-2018-1000001</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001</a><br><a href="https://linux.oracle.com/cve/CVE-2018-1000001.html">https://linux.oracle.com/cve/CVE-2018-1000001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://lists.samba.org/archive/rsync/2018-February/031478.html">https://lists.samba.org/archive/rsync/2018-February/031478.html</a><br><a href="https://security.netapp.com/advisory/ntap-20190404-0003/">https://security.netapp.com/advisory/ntap-20190404-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=18203">https://sourceware.org/bugzilla/show_bug.cgi?id=18203</a><br><a href="https://ubuntu.com/security/notices/USN-3534-1">https://ubuntu.com/security/notices/USN-3534-1</a><br><a href="https://ubuntu.com/security/notices/USN-3536-1">https://ubuntu.com/security/notices/USN-3536-1</a><br><a href="https://usn.ubuntu.com/3534-1/">https://usn.ubuntu.com/3534-1/</a><br><a href="https://usn.ubuntu.com/3536-1/">https://usn.ubuntu.com/3536-1/</a><br><a href="https://www.exploit-db.com/exploits/43775/">https://www.exploit-db.com/exploits/43775/</a><br><a href="https://www.exploit-db.com/exploits/44889/">https://www.exploit-db.com/exploits/44889/</a><br><a href="https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/">https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/</a><br></details> |
| multiarch-support | CVE-2020-1751 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| multiarch-support | CVE-2020-1752 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| multiarch-support | CVE-2021-3326 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| multiarch-support | CVE-2021-3999 | HIGH | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| multiarch-support | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html</a><br><a href="http://www.securityfocus.com/bid/106672">http://www.securityfocus.com/bid/106672</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2118">https://access.redhat.com/errata/RHSA-2019:2118</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3513">https://access.redhat.com/errata/RHSA-2019:3513</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10739">https://access.redhat.com/security/cve/CVE-2016-10739</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1347549">https://bugzilla.redhat.com/show_bug.cgi?id=1347549</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10739.html">https://linux.oracle.com/cve/CVE-2016-10739.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3513.html">https://linux.oracle.com/errata/ELSA-2019-3513.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">https://nvd.nist.gov/vuln/detail/CVE-2016-10739</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=20018">https://sourceware.org/bugzilla/show_bug.cgi?id=20018</a><br></details> |
| multiarch-support | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/100598">http://www.securityfocus.com/bid/100598</a><br><a href="https://access.redhat.com/errata/RHSA-2018:0805">https://access.redhat.com/errata/RHSA-2018:0805</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-12132">https://access.redhat.com/security/cve/CVE-2017-12132</a><br><a href="https://arxiv.org/pdf/1205.4011.pdf">https://arxiv.org/pdf/1205.4011.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2017-12132.html">https://linux.oracle.com/cve/CVE-2017-12132.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2018-0805.html">https://linux.oracle.com/errata/ELSA-2018-0805.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=21361">https://sourceware.org/bugzilla/show_bug.cgi?id=21361</a><br></details> |
| multiarch-support | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| multiarch-support | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| multiarch-support | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| multiarch-support | CVE-2021-3998 | MEDIUM | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| multiarch-support | CVE-2010-4756 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| multiarch-support | CVE-2015-8985 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/02/14/9">http://www.openwall.com/lists/oss-security/2017/02/14/9</a><br><a href="http://www.securityfocus.com/bid/76916">http://www.securityfocus.com/bid/76916</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-8985">https://access.redhat.com/security/cve/CVE-2015-8985</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985</a><br><a href="https://security.gentoo.org/glsa/201908-06">https://security.gentoo.org/glsa/201908-06</a><br></details> |
| multiarch-support | CVE-2016-10228 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| multiarch-support | CVE-2018-20796 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| multiarch-support | CVE-2019-1010022 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| multiarch-support | CVE-2019-1010023 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| multiarch-support | CVE-2019-1010024 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| multiarch-support | CVE-2019-1010025 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| multiarch-support | CVE-2019-19126 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| multiarch-support | CVE-2019-6488 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106671">http://www.securityfocus.com/bid/106671</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-6488">https://access.redhat.com/security/cve/CVE-2019-6488</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6488">https://nvd.nist.gov/vuln/detail/CVE-2019-6488</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24097">https://sourceware.org/bugzilla/show_bug.cgi?id=24097</a><br></details> |
| multiarch-support | CVE-2019-7309 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/106835">http://www.securityfocus.com/bid/106835</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-7309">https://access.redhat.com/security/cve/CVE-2019-7309</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">https://nvd.nist.gov/vuln/detail/CVE-2019-7309</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24155">https://sourceware.org/bugzilla/show_bug.cgi?id=24155</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html">https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html</a><br></details> |
| multiarch-support | CVE-2019-9192 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| multiarch-support | CVE-2020-6096 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| multiarch-support | CVE-2021-27645 | LOW | 2.24-11+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| ncurses-base | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| ncurses-base | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| ncurses-base | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| ncurses-bin | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-19211">https://access.redhat.com/security/cve/CVE-2018-19211</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1643754">https://bugzilla.redhat.com/show_bug.cgi?id=1643754</a><br></details> |
| ncurses-bin | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17594">https://access.redhat.com/security/cve/CVE-2019-17594</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| ncurses-bin | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17595">https://access.redhat.com/security/cve/CVE-2019-17595</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17595.html">https://linux.oracle.com/cve/CVE-2019-17595.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
| ncurses-bin | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| openssh-client | CVE-2021-41617 | HIGH | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41617">https://access.redhat.com/security/cve/CVE-2021-41617</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1190975">https://bugzilla.suse.com/show_bug.cgi?id=1190975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41617.html">https://linux.oracle.com/cve/CVE-2021-41617.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9575.html">https://linux.oracle.com/errata/ELSA-2021-9575.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">https://nvd.nist.gov/vuln/detail/CVE-2021-41617</a><br><a href="https://security.netapp.com/advisory/ntap-20211014-0004/">https://security.netapp.com/advisory/ntap-20211014-0004/</a><br><a href="https://www.openssh.com/security.html">https://www.openssh.com/security.html</a><br><a href="https://www.openssh.com/txt/release-8.8">https://www.openssh.com/txt/release-8.8</a><br><a href="https://www.openwall.com/lists/oss-security/2021/09/26/1">https://www.openwall.com/lists/oss-security/2021/09/26/1</a><br></details> |
| openssh-client | CVE-2007-2243 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html">http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html</a><br><a href="http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html">http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html</a><br><a href="http://securityreason.com/securityalert/2631">http://securityreason.com/securityalert/2631</a><br><a href="http://www.osvdb.org/34600">http://www.osvdb.org/34600</a><br><a href="http://www.securityfocus.com/bid/23601">http://www.securityfocus.com/bid/23601</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/33794">https://exchange.xforce.ibmcloud.com/vulnerabilities/33794</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0003/">https://security.netapp.com/advisory/ntap-20191107-0003/</a><br></details> |
| openssh-client | CVE-2007-2768 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html">http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html</a><br><a href="http://www.osvdb.org/34601">http://www.osvdb.org/34601</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2007-2768">https://nvd.nist.gov/vuln/detail/CVE-2007-2768</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0002/">https://security.netapp.com/advisory/ntap-20191107-0002/</a><br></details> |
| openssh-client | CVE-2008-3234 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/30276">http://www.securityfocus.com/bid/30276</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44037">https://exchange.xforce.ibmcloud.com/vulnerabilities/44037</a><br><a href="https://www.exploit-db.com/exploits/6094">https://www.exploit-db.com/exploits/6094</a><br></details> |
| openssh-client | CVE-2016-20012 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2016-20012">https://access.redhat.com/security/cve/CVE-2016-20012</a><br><a href="https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265">https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265</a><br><a href="https://github.com/openssh/openssh-portable/pull/270">https://github.com/openssh/openssh-portable/pull/270</a><br><a href="https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097">https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097</a><br><a href="https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185">https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-20012">https://nvd.nist.gov/vuln/detail/CVE-2016-20012</a><br><a href="https://rushter.com/blog/public-ssh-keys/">https://rushter.com/blog/public-ssh-keys/</a><br><a href="https://security.netapp.com/advisory/ntap-20211014-0005/">https://security.netapp.com/advisory/ntap-20211014-0005/</a><br><a href="https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak">https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak</a><br><a href="https://www.openwall.com/lists/oss-security/2018/08/24/1">https://www.openwall.com/lists/oss-security/2018/08/24/1</a><br></details> |
| openssh-client | CVE-2018-15919 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2018/q3/180">http://seclists.org/oss-sec/2018/q3/180</a><br><a href="http://www.securityfocus.com/bid/105163">http://www.securityfocus.com/bid/105163</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-15919">https://access.redhat.com/security/cve/CVE-2018-15919</a><br><a href="https://security.netapp.com/advisory/ntap-20181221-0001/">https://security.netapp.com/advisory/ntap-20181221-0001/</a><br></details> |
| openssh-client | CVE-2019-6110 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6110">https://access.redhat.com/security/cve/CVE-2019-6110</a><br><a href="https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c">https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c</a><br><a href="https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c">https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c</a><br><a href="https://security.gentoo.org/glsa/201903-16">https://security.gentoo.org/glsa/201903-16</a><br><a href="https://security.netapp.com/advisory/ntap-20190213-0001/">https://security.netapp.com/advisory/ntap-20190213-0001/</a><br><a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt">https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt</a><br><a href="https://www.exploit-db.com/exploits/46193/">https://www.exploit-db.com/exploits/46193/</a><br></details> |
| openssh-client | CVE-2020-12062 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-12062">https://access.redhat.com/security/cve/CVE-2020-12062</a><br><a href="https://github.com/openssh/openssh-portable/commit/955854cafca88e0cdcd3d09ca1ad4ada465364a1">https://github.com/openssh/openssh-portable/commit/955854cafca88e0cdcd3d09ca1ad4ada465364a1</a><br><a href="https://github.com/openssh/openssh-portable/commit/aad87b88fc2536b1ea023213729aaf4eaabe1894">https://github.com/openssh/openssh-portable/commit/aad87b88fc2536b1ea023213729aaf4eaabe1894</a><br><a href="https://www.openssh.com/txt/release-8.3">https://www.openssh.com/txt/release-8.3</a><br><a href="https://www.openwall.com/lists/oss-security/2020/05/27/1">https://www.openwall.com/lists/oss-security/2020/05/27/1</a><br></details> |
| openssh-client | CVE-2020-14145 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/12/02/1">http://www.openwall.com/lists/oss-security/2020/12/02/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14145">https://access.redhat.com/security/cve/CVE-2020-14145</a><br><a href="https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d">https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145</a><br><a href="https://docs.ssh-mitm.at/CVE-2020-14145.html">https://docs.ssh-mitm.at/CVE-2020-14145.html</a><br><a href="https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1">https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1</a><br><a href="https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py">https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14145.html">https://linux.oracle.com/cve/CVE-2020-14145.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4368.html">https://linux.oracle.com/errata/ELSA-2021-4368.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">https://nvd.nist.gov/vuln/detail/CVE-2020-14145</a><br><a href="https://security.gentoo.org/glsa/202105-35">https://security.gentoo.org/glsa/202105-35</a><br><a href="https://security.netapp.com/advisory/ntap-20200709-0004/">https://security.netapp.com/advisory/ntap-20200709-0004/</a><br><a href="https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/">https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/</a><br><a href="https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf">https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf</a><br></details> |
| openssh-client | CVE-2020-15778 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/articles/5284081">https://access.redhat.com/articles/5284081</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15778">https://access.redhat.com/security/cve/CVE-2020-15778</a><br><a href="https://github.com/cpandya2909/CVE-2020-15778">https://github.com/cpandya2909/CVE-2020-15778</a><br><a href="https://github.com/cpandya2909/CVE-2020-15778/">https://github.com/cpandya2909/CVE-2020-15778/</a><br><a href="https://news.ycombinator.com/item?id=25005567">https://news.ycombinator.com/item?id=25005567</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15778">https://nvd.nist.gov/vuln/detail/CVE-2020-15778</a><br><a href="https://security.netapp.com/advisory/ntap-20200731-0007/">https://security.netapp.com/advisory/ntap-20200731-0007/</a><br><a href="https://www.openssh.com/security.html">https://www.openssh.com/security.html</a><br></details> |
| openssh-client | CVE-2021-36368 | LOW | 1:7.4p1-10+deb9u7 | | <details><summary>Expand...</summary><a href="https://bugzilla.mindrot.org/show_bug.cgi?id=3316">https://bugzilla.mindrot.org/show_bug.cgi?id=3316</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368</a><br><a href="https://docs.ssh-mitm.at/trivialauth.html">https://docs.ssh-mitm.at/trivialauth.html</a><br><a href="https://github.com/openssh/openssh-portable/pull/258">https://github.com/openssh/openssh-portable/pull/258</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36368">https://nvd.nist.gov/vuln/detail/CVE-2021-36368</a><br><a href="https://www.openssh.com/security.html">https://www.openssh.com/security.html</a><br></details> |
| openssl | CVE-2021-23840 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| openssl | CVE-2021-3712 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
| openssl | CVE-2022-0778 | HIGH | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9249.html">https://linux.oracle.com/errata/ELSA-2022-9249.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br></details> |
| openssl | CVE-2019-1551 | MEDIUM | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html</a><br><a href="http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html">http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1551">https://access.redhat.com/security/cve/CVE-2019-1551</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98</a><br><a href="https://github.com/openssl/openssl/pull/10575">https://github.com/openssl/openssl/pull/10575</a><br><a href="https://linux.oracle.com/cve/CVE-2019-1551.html">https://linux.oracle.com/cve/CVE-2019-1551.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4514.html">https://linux.oracle.com/errata/ELSA-2020-4514.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/</a><br><a href="https://seclists.org/bugtraq/2019/Dec/39">https://seclists.org/bugtraq/2019/Dec/39</a><br><a href="https://seclists.org/bugtraq/2019/Dec/46">https://seclists.org/bugtraq/2019/Dec/46</a><br><a href="https://security.gentoo.org/glsa/202004-10">https://security.gentoo.org/glsa/202004-10</a><br><a href="https://security.netapp.com/advisory/ntap-20191210-0001/">https://security.netapp.com/advisory/ntap-20191210-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4376-1">https://ubuntu.com/security/notices/USN-4376-1</a><br><a href="https://ubuntu.com/security/notices/USN-4504-1">https://ubuntu.com/security/notices/USN-4504-1</a><br><a href="https://usn.ubuntu.com/4376-1/">https://usn.ubuntu.com/4376-1/</a><br><a href="https://usn.ubuntu.com/4504-1/">https://usn.ubuntu.com/4504-1/</a><br><a href="https://www.debian.org/security/2019/dsa-4594">https://www.debian.org/security/2019/dsa-4594</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20191206.txt">https://www.openssl.org/news/secadv/20191206.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.tenable.com/security/tns-2019-09">https://www.tenable.com/security/tns-2019-09</a><br><a href="https://www.tenable.com/security/tns-2020-03">https://www.tenable.com/security/tns-2020-03</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| openssl | CVE-2021-23841 | MEDIUM | 1.1.0l-1~deb9u2 | 1.1.0l-1~deb9u3 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| openssl | CVE-2021-4160 | MEDIUM | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4160">https://access.redhat.com/security/cve/CVE-2021-4160</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4160">https://nvd.nist.gov/vuln/detail/CVE-2021-4160</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220128.txt">https://www.openssl.org/news/secadv/20220128.txt</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.0l-1~deb9u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2017-12424 | CRITICAL | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2017-12424">https://access.redhat.com/security/cve/CVE-2017-12424</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675</a><br><a href="https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952">https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html</a><br><a href="https://security.gentoo.org/glsa/201710-16">https://security.gentoo.org/glsa/201710-16</a><br></details> |
| passwd | CVE-2017-20002 | HIGH | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | <details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2018-7169 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| passwd | CVE-2019-19882 | LOW | 1:4.4-4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| patch | CVE-2010-4651 | LOW | 2.7.5-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1">http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1</a><br><a href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html">http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html</a><br><a href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html">http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html</a><br><a href="http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html">http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html</a><br><a href="http://openwall.com/lists/oss-security/2011/01/05/10">http://openwall.com/lists/oss-security/2011/01/05/10</a><br><a href="http://openwall.com/lists/oss-security/2011/01/06/19">http://openwall.com/lists/oss-security/2011/01/06/19</a><br><a href="http://openwall.com/lists/oss-security/2011/01/06/20">http://openwall.com/lists/oss-security/2011/01/06/20</a><br><a href="http://openwall.com/lists/oss-security/2011/01/06/21">http://openwall.com/lists/oss-security/2011/01/06/21</a><br><a href="http://secunia.com/advisories/43663">http://secunia.com/advisories/43663</a><br><a href="http://secunia.com/advisories/43677">http://secunia.com/advisories/43677</a><br><a href="http://support.apple.com/kb/HT4723">http://support.apple.com/kb/HT4723</a><br><a href="http://www.securityfocus.com/bid/46768">http://www.securityfocus.com/bid/46768</a><br><a href="http://www.vupen.com/english/advisories/2011/0600">http://www.vupen.com/english/advisories/2011/0600</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4651">https://access.redhat.com/security/cve/CVE-2010-4651</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=667529">https://bugzilla.redhat.com/show_bug.cgi?id=667529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651</a><br><a href="https://ubuntu.com/security/notices/USN-2651-1">https://ubuntu.com/security/notices/USN-2651-1</a><br></details> |
| patch | CVE-2016-10713 | LOW | 2.7.5-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103063">http://www.securityfocus.com/bid/103063</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2033">https://access.redhat.com/errata/RHSA-2019:2033</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10713">https://access.redhat.com/security/cve/CVE-2016-10713</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713</a><br><a href="https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866">https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10713.html">https://linux.oracle.com/cve/CVE-2016-10713.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2033.html">https://linux.oracle.com/errata/ELSA-2019-2033.html</a><br><a href="https://savannah.gnu.org/bugs/index.php?45990">https://savannah.gnu.org/bugs/index.php?45990</a><br><a href="https://ubuntu.com/security/notices/USN-3624-1">https://ubuntu.com/security/notices/USN-3624-1</a><br><a href="https://ubuntu.com/security/notices/USN-3624-2">https://ubuntu.com/security/notices/USN-3624-2</a><br><a href="https://usn.ubuntu.com/3624-1/">https://usn.ubuntu.com/3624-1/</a><br><a href="https://usn.ubuntu.com/3624-2/">https://usn.ubuntu.com/3624-2/</a><br></details> |
| patch | CVE-2018-6951 | LOW | 2.7.5-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103044">http://www.securityfocus.com/bid/103044</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6951">https://access.redhat.com/security/cve/CVE-2018-6951</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951</a><br><a href="https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a">https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-6951">https://nvd.nist.gov/vuln/detail/CVE-2018-6951</a><br><a href="https://savannah.gnu.org/bugs/index.php?53132">https://savannah.gnu.org/bugs/index.php?53132</a><br><a href="https://security.gentoo.org/glsa/201904-17">https://security.gentoo.org/glsa/201904-17</a><br><a href="https://ubuntu.com/security/notices/USN-3624-1">https://ubuntu.com/security/notices/USN-3624-1</a><br><a href="https://usn.ubuntu.com/3624-1/">https://usn.ubuntu.com/3624-1/</a><br></details> |
| patch | CVE-2018-6952 | LOW | 2.7.5-1+deb9u2 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/103047">http://www.securityfocus.com/bid/103047</a><br><a href="https://access.redhat.com/errata/RHSA-2019:2033">https://access.redhat.com/errata/RHSA-2019:2033</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-6952">https://access.redhat.com/security/cve/CVE-2018-6952</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952</a><br><a href="https://linux.oracle.com/cve/CVE-2018-6952.html">https://linux.oracle.com/cve/CVE-2018-6952.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-2033.html">https://linux.oracle.com/errata/ELSA-2019-2033.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">https://nvd.nist.gov/vuln/detail/CVE-2018-6952</a><br><a href="https://savannah.gnu.org/bugs/index.php?53133">https://savannah.gnu.org/bugs/index.php?53133</a><br><a href="https://security.gentoo.org/glsa/201904-17">https://security.gentoo.org/glsa/201904-17</a><br></details> |
| patch | CVE-2021-45261 | LOW | 2.7.5-1+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45261">https://access.redhat.com/security/cve/CVE-2021-45261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261</a><br><a href="https://savannah.gnu.org/bugs/?61685">https://savannah.gnu.org/bugs/?61685</a><br></details> |
| perl | CVE-2020-16156 | HIGH | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c">https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl | CVE-2011-4116 | LOW | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| perl-base | CVE-2020-16156 | HIGH | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c">https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2011-4116 | LOW | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| perl-modules-5.24 | CVE-2020-16156 | HIGH | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c">https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-modules-5.24 | CVE-2011-4116 | LOW | 5.24.1-3+deb9u7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| python | CVE-2008-4108 | LOW | 2.7.13-2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899</a><br><a href="http://marc.info/?l=oss-security&amp;m=122148330903513&amp;w=2">http://marc.info/?l=oss-security&amp;m=122148330903513&amp;w=2</a><br><a href="http://marc.info/?l=oss-security&amp;m=122152861617434&amp;w=2">http://marc.info/?l=oss-security&amp;m=122152861617434&amp;w=2</a><br><a href="http://securityreason.com/securityalert/4274">http://securityreason.com/securityalert/4274</a><br><a href="http://www.securityfocus.com/bid/31184">http://www.securityfocus.com/bid/31184</a><br><a href="http://www.securitytracker.com/id?1020904">http://www.securitytracker.com/id?1020904</a><br><a href="http://www.vupen.com/english/advisories/2008/2659">http://www.vupen.com/english/advisories/2008/2659</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-4108">https://access.redhat.com/security/cve/CVE-2008-4108</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=462326">https://bugzilla.redhat.com/show_bug.cgi?id=462326</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/45161">https://exchange.xforce.ibmcloud.com/vulnerabilities/45161</a><br></details> |
| python-minimal | CVE-2008-4108 | LOW | 2.7.13-2 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899</a><br><a href="http://marc.info/?l=oss-security&amp;m=122148330903513&amp;w=2">http://marc.info/?l=oss-security&amp;m=122148330903513&amp;w=2</a><br><a href="http://marc.info/?l=oss-security&amp;m=122152861617434&amp;w=2">http://marc.info/?l=oss-security&amp;m=122152861617434&amp;w=2</a><br><a href="http://securityreason.com/securityalert/4274">http://securityreason.com/securityalert/4274</a><br><a href="http://www.securityfocus.com/bid/31184">http://www.securityfocus.com/bid/31184</a><br><a href="http://www.securitytracker.com/id?1020904">http://www.securitytracker.com/id?1020904</a><br><a href="http://www.vupen.com/english/advisories/2008/2659">http://www.vupen.com/english/advisories/2008/2659</a><br><a href="https://access.redhat.com/security/cve/CVE-2008-4108">https://access.redhat.com/security/cve/CVE-2008-4108</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=462326">https://bugzilla.redhat.com/show_bug.cgi?id=462326</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/45161">https://exchange.xforce.ibmcloud.com/vulnerabilities/45161</a><br></details> |
| python2.7 | CVE-2021-3177 | CRITICAL | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python2.7 | CVE-2019-16935 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16935">https://access.redhat.com/security/cve/CVE-2019-16935</a><br><a href="https://bugs.python.org/issue38243">https://bugs.python.org/issue38243</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935</a><br><a href="https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897">https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897</a><br><a href="https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213">https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213</a><br><a href="https://github.com/python/cpython/pull/16373">https://github.com/python/cpython/pull/16373</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16935.html">https://linux.oracle.com/cve/CVE-2019-16935.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4433.html">https://linux.oracle.com/errata/ELSA-2020-4433.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/</a><br><a href="https://security.netapp.com/advisory/ntap-20191017-0004/">https://security.netapp.com/advisory/ntap-20191017-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4151-1">https://ubuntu.com/security/notices/USN-4151-1</a><br><a href="https://ubuntu.com/security/notices/USN-4151-2">https://ubuntu.com/security/notices/USN-4151-2</a><br><a href="https://usn.ubuntu.com/4151-1/">https://usn.ubuntu.com/4151-1/</a><br><a href="https://usn.ubuntu.com/4151-2/">https://usn.ubuntu.com/4151-2/</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br></details> |
| python2.7 | CVE-2021-23336 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python2.7 | CVE-2021-4189 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| python2.7 | CVE-2013-7040 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.python.org/issue14621">http://bugs.python.org/issue14621</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/13">http://www.openwall.com/lists/oss-security/2013/12/09/13</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/3">http://www.openwall.com/lists/oss-security/2013/12/09/3</a><br><a href="http://www.securityfocus.com/bid/64194">http://www.securityfocus.com/bid/64194</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-7040">https://access.redhat.com/security/cve/CVE-2013-7040</a><br><a href="https://support.apple.com/kb/HT205031">https://support.apple.com/kb/HT205031</a><br></details> |
| python2.7 | CVE-2017-17522 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| python2.7 | CVE-2018-1000030 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000030">https://access.redhat.com/security/cve/CVE-2018-1000030</a><br><a href="https://bugs.python.org/issue31530">https://bugs.python.org/issue31530</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030</a><br><a href="https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view">https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view</a><br><a href="https://security.gentoo.org/glsa/201811-02">https://security.gentoo.org/glsa/201811-02</a><br><a href="https://ubuntu.com/security/notices/USN-3817-1">https://ubuntu.com/security/notices/USN-3817-1</a><br><a href="https://ubuntu.com/security/notices/USN-3817-2">https://ubuntu.com/security/notices/USN-3817-2</a><br><a href="https://usn.ubuntu.com/3817-1/">https://usn.ubuntu.com/3817-1/</a><br><a href="https://usn.ubuntu.com/3817-2/">https://usn.ubuntu.com/3817-2/</a><br><a href="https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0">https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| python2.7 | CVE-2019-18348 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18348">https://access.redhat.com/security/cve/CVE-2019-18348</a><br><a href="https://bugs.python.org/issue30458#msg347282">https://bugs.python.org/issue30458#msg347282</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1727276">https://bugzilla.redhat.com/show_bug.cgi?id=1727276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">https://nvd.nist.gov/vuln/detail/CVE-2019-18348</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0004/">https://security.netapp.com/advisory/ntap-20191107-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| python2.7 | CVE-2019-9674 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| python2.7 | CVE-2020-8492 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-8492">https://access.redhat.com/security/cve/CVE-2020-8492</a><br><a href="https://bugs.python.org/issue39503">https://bugs.python.org/issue39503</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492</a><br><a href="https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4">https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4</a><br><a href="https://github.com/python/cpython/pull/18284">https://github.com/python/cpython/pull/18284</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8492.html">https://linux.oracle.com/cve/CVE-2020-8492.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4641.html">https://linux.oracle.com/errata/ELSA-2020-4641.html</a><br><a href="https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html">https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html</a><br><a href="https://security.gentoo.org/glsa/202005-09">https://security.gentoo.org/glsa/202005-09</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0001/">https://security.netapp.com/advisory/ntap-20200221-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br></details> |
| python2.7-minimal | CVE-2021-3177 | CRITICAL | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python2.7-minimal | CVE-2019-16935 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-16935">https://access.redhat.com/security/cve/CVE-2019-16935</a><br><a href="https://bugs.python.org/issue38243">https://bugs.python.org/issue38243</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935</a><br><a href="https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897">https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897</a><br><a href="https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213">https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213</a><br><a href="https://github.com/python/cpython/pull/16373">https://github.com/python/cpython/pull/16373</a><br><a href="https://linux.oracle.com/cve/CVE-2019-16935.html">https://linux.oracle.com/cve/CVE-2019-16935.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4433.html">https://linux.oracle.com/errata/ELSA-2020-4433.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/</a><br><a href="https://security.netapp.com/advisory/ntap-20191017-0004/">https://security.netapp.com/advisory/ntap-20191017-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4151-1">https://ubuntu.com/security/notices/USN-4151-1</a><br><a href="https://ubuntu.com/security/notices/USN-4151-2">https://ubuntu.com/security/notices/USN-4151-2</a><br><a href="https://usn.ubuntu.com/4151-1/">https://usn.ubuntu.com/4151-1/</a><br><a href="https://usn.ubuntu.com/4151-2/">https://usn.ubuntu.com/4151-2/</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br></details> |
| python2.7-minimal | CVE-2021-23336 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u5 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python2.7-minimal | CVE-2021-4189 | MEDIUM | 2.7.13-2+deb9u4 | 2.7.13-2+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| python2.7-minimal | CVE-2013-7040 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://bugs.python.org/issue14621">http://bugs.python.org/issue14621</a><br><a href="http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html">http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/13">http://www.openwall.com/lists/oss-security/2013/12/09/13</a><br><a href="http://www.openwall.com/lists/oss-security/2013/12/09/3">http://www.openwall.com/lists/oss-security/2013/12/09/3</a><br><a href="http://www.securityfocus.com/bid/64194">http://www.securityfocus.com/bid/64194</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-7040">https://access.redhat.com/security/cve/CVE-2013-7040</a><br><a href="https://support.apple.com/kb/HT205031">https://support.apple.com/kb/HT205031</a><br></details> |
| python2.7-minimal | CVE-2017-17522 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| python2.7-minimal | CVE-2018-1000030 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-1000030">https://access.redhat.com/security/cve/CVE-2018-1000030</a><br><a href="https://bugs.python.org/issue31530">https://bugs.python.org/issue31530</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030</a><br><a href="https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view">https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view</a><br><a href="https://security.gentoo.org/glsa/201811-02">https://security.gentoo.org/glsa/201811-02</a><br><a href="https://ubuntu.com/security/notices/USN-3817-1">https://ubuntu.com/security/notices/USN-3817-1</a><br><a href="https://ubuntu.com/security/notices/USN-3817-2">https://ubuntu.com/security/notices/USN-3817-2</a><br><a href="https://usn.ubuntu.com/3817-1/">https://usn.ubuntu.com/3817-1/</a><br><a href="https://usn.ubuntu.com/3817-2/">https://usn.ubuntu.com/3817-2/</a><br><a href="https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0">https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| python2.7-minimal | CVE-2019-18348 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18348">https://access.redhat.com/security/cve/CVE-2019-18348</a><br><a href="https://bugs.python.org/issue30458#msg347282">https://bugs.python.org/issue30458#msg347282</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1727276">https://bugzilla.redhat.com/show_bug.cgi?id=1727276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">https://nvd.nist.gov/vuln/detail/CVE-2019-18348</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0004/">https://security.netapp.com/advisory/ntap-20191107-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| python2.7-minimal | CVE-2019-9674 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| python2.7-minimal | CVE-2020-8492 | LOW | 2.7.13-2+deb9u4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-8492">https://access.redhat.com/security/cve/CVE-2020-8492</a><br><a href="https://bugs.python.org/issue39503">https://bugs.python.org/issue39503</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492</a><br><a href="https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4">https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4</a><br><a href="https://github.com/python/cpython/pull/18284">https://github.com/python/cpython/pull/18284</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8492.html">https://linux.oracle.com/cve/CVE-2020-8492.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4641.html">https://linux.oracle.com/errata/ELSA-2020-4641.html</a><br><a href="https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E">https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html">https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html</a><br><a href="https://security.gentoo.org/glsa/202005-09">https://security.gentoo.org/glsa/202005-09</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0001/">https://security.netapp.com/advisory/ntap-20200221-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br></details> |
| python3.5 | CVE-2021-3177 | CRITICAL | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python3.5 | CVE-2021-3737 | HIGH | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3737">https://access.redhat.com/security/cve/CVE-2021-3737</a><br><a href="https://bugs.python.org/issue44022">https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href="https://github.com/python/cpython/pull/25916">https://github.com/python/cpython/pull/25916</a><br><a href="https://github.com/python/cpython/pull/26503">https://github.com/python/cpython/pull/26503</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3737.html">https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">https://nvd.nist.gov/vuln/detail/CVE-2021-3737</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html">https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3737">https://ubuntu.com/security/CVE-2021-3737</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://ubuntu.com/security/notices/USN-5201-1">https://ubuntu.com/security/notices/USN-5201-1</a><br></details> |
| python3.5 | CVE-2022-0391 | HIGH | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0391">https://access.redhat.com/security/cve/CVE-2022-0391</a><br><a href="https://bugs.python.org/issue43882">https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">https://nvd.nist.gov/vuln/detail/CVE-2022-0391</a><br><a href="https://security.netapp.com/advisory/ntap-20220225-0009/">https://security.netapp.com/advisory/ntap-20220225-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| python3.5 | CVE-2021-23336 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python3.5 | CVE-2021-3426 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3426">https://access.redhat.com/security/cve/CVE-2021-3426</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1935913">https://bugzilla.redhat.com/show_bug.cgi?id=1935913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426</a><br><a href="https://github.com/python/cpython/pull/24285">https://github.com/python/cpython/pull/24285</a><br><a href="https://github.com/python/cpython/pull/24337">https://github.com/python/cpython/pull/24337</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3426.html">https://linux.oracle.com/cve/CVE-2021-3426.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9562.html">https://linux.oracle.com/errata/ELSA-2021-9562.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/</a><br><a href="https://python-security.readthedocs.io/vuln/pydoc-getfile.html">https://python-security.readthedocs.io/vuln/pydoc-getfile.html</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0003/">https://security.netapp.com/advisory/ntap-20210629-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python3.5 | CVE-2021-3733 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3733">https://access.redhat.com/security/cve/CVE-2021-3733</a><br><a href="https://bugs.python.org/issue43075">https://bugs.python.org/issue43075</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995234">https://bugzilla.redhat.com/show_bug.cgi?id=1995234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733</a><br><a href="https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final">https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final</a><br><a href="https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final">https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final</a><br><a href="https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final">https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final</a><br><a href="https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final">https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final</a><br><a href="https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)">https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)</a><br><a href="https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)">https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)</a><br><a href="https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)">https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)</a><br><a href="https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)">https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)</a><br><a href="https://github.com/python/cpython/pull/24391">https://github.com/python/cpython/pull/24391</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3733.html">https://linux.oracle.com/cve/CVE-2021-3733.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3733">https://ubuntu.com/security/CVE-2021-3733</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br></details> |
| python3.5 | CVE-2021-4189 | MEDIUM | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| python3.5 | CVE-2017-17522 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| python3.5 | CVE-2019-9674 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| python3.5-minimal | CVE-2021-3177 | CRITICAL | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3177">https://access.redhat.com/security/cve/CVE-2021-3177</a><br><a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177</a><br><a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3177.html">https://linux.oracle.com/cve/CVE-2021-3177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9130.html">https://linux.oracle.com/errata/ELSA-2021-9130.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html">https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/</a><br><a href="https://news.ycombinator.com/item?id=26185005">https://news.ycombinator.com/item?id=26185005</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">https://nvd.nist.gov/vuln/detail/CVE-2021-3177</a><br><a href="https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html">https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html</a><br><a href="https://security.gentoo.org/glsa/202101-18">https://security.gentoo.org/glsa/202101-18</a><br><a href="https://security.netapp.com/advisory/ntap-20210226-0003/">https://security.netapp.com/advisory/ntap-20210226-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4754-1">https://ubuntu.com/security/notices/USN-4754-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)">https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://ubuntu.com/security/notices/USN-4754-4">https://ubuntu.com/security/notices/USN-4754-4</a><br><a href="https://ubuntu.com/security/notices/USN-4754-5">https://ubuntu.com/security/notices/USN-4754-5</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python3.5-minimal | CVE-2021-3737 | HIGH | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3737">https://access.redhat.com/security/cve/CVE-2021-3737</a><br><a href="https://bugs.python.org/issue44022">https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href="https://github.com/python/cpython/pull/25916">https://github.com/python/cpython/pull/25916</a><br><a href="https://github.com/python/cpython/pull/26503">https://github.com/python/cpython/pull/26503</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3737.html">https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">https://nvd.nist.gov/vuln/detail/CVE-2021-3737</a><br><a href="https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html">https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3737">https://ubuntu.com/security/CVE-2021-3737</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br><a href="https://ubuntu.com/security/notices/USN-5201-1">https://ubuntu.com/security/notices/USN-5201-1</a><br></details> |
| python3.5-minimal | CVE-2022-0391 | HIGH | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0391">https://access.redhat.com/security/cve/CVE-2022-0391</a><br><a href="https://bugs.python.org/issue43882">https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">https://nvd.nist.gov/vuln/detail/CVE-2022-0391</a><br><a href="https://security.netapp.com/advisory/ntap-20220225-0009/">https://security.netapp.com/advisory/ntap-20220225-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| python3.5-minimal | CVE-2021-23336 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/02/19/4">http://www.openwall.com/lists/oss-security/2021/02/19/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/01/2">http://www.openwall.com/lists/oss-security/2021/05/01/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23336">https://access.redhat.com/security/cve/CVE-2021-23336</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336</a><br><a href="https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)">https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)</a><br><a href="https://github.com/python/cpython/pull/24297">https://github.com/python/cpython/pull/24297</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23336.html">https://linux.oracle.com/cve/CVE-2021-23336.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4162.html">https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href="https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E">https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html">https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">https://nvd.nist.gov/vuln/detail/CVE-2021-23336</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0004/">https://security.netapp.com/advisory/ntap-20210326-0004/</a><br><a href="https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/">https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/</a><br><a href="https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933">https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933</a><br><a href="https://ubuntu.com/security/notices/USN-4742-1">https://ubuntu.com/security/notices/USN-4742-1</a><br><a href="https://www.djangoproject.com/weblog/2021/feb/19/security-releases/">https://www.djangoproject.com/weblog/2021/feb/19/security-releases/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python3.5-minimal | CVE-2021-3426 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3426">https://access.redhat.com/security/cve/CVE-2021-3426</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1935913">https://bugzilla.redhat.com/show_bug.cgi?id=1935913</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426</a><br><a href="https://github.com/python/cpython/pull/24285">https://github.com/python/cpython/pull/24285</a><br><a href="https://github.com/python/cpython/pull/24337">https://github.com/python/cpython/pull/24337</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3426.html">https://linux.oracle.com/cve/CVE-2021-3426.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9562.html">https://linux.oracle.com/errata/ELSA-2021-9562.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/</a><br><a href="https://python-security.readthedocs.io/vuln/pydoc-getfile.html">https://python-security.readthedocs.io/vuln/pydoc-getfile.html</a><br><a href="https://security.gentoo.org/glsa/202104-04">https://security.gentoo.org/glsa/202104-04</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0003/">https://security.netapp.com/advisory/ntap-20210629-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| python3.5-minimal | CVE-2021-3733 | MEDIUM | 3.5.3-1+deb9u3 | 3.5.3-1+deb9u5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3733">https://access.redhat.com/security/cve/CVE-2021-3733</a><br><a href="https://bugs.python.org/issue43075">https://bugs.python.org/issue43075</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995234">https://bugzilla.redhat.com/show_bug.cgi?id=1995234</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733</a><br><a href="https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final">https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final</a><br><a href="https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final">https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final</a><br><a href="https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final">https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final</a><br><a href="https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final">https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final</a><br><a href="https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)">https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb</a><br><a href="https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)">https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)</a><br><a href="https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)">https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)</a><br><a href="https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)">https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)</a><br><a href="https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)">https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)</a><br><a href="https://github.com/python/cpython/pull/24391">https://github.com/python/cpython/pull/24391</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3733.html">https://linux.oracle.com/cve/CVE-2021-3733.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4160.html">https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href="https://ubuntu.com/security/CVE-2021-3733">https://ubuntu.com/security/CVE-2021-3733</a><br><a href="https://ubuntu.com/security/notices/USN-5083-1">https://ubuntu.com/security/notices/USN-5083-1</a><br><a href="https://ubuntu.com/security/notices/USN-5199-1">https://ubuntu.com/security/notices/USN-5199-1</a><br><a href="https://ubuntu.com/security/notices/USN-5200-1">https://ubuntu.com/security/notices/USN-5200-1</a><br></details> |
| python3.5-minimal | CVE-2021-4189 | MEDIUM | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4189">https://access.redhat.com/security/cve/CVE-2021-4189</a><br><a href="https://bugs.python.org/issue43285">https://bugs.python.org/issue43285</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020">https://bugzilla.redhat.com/show_bug.cgi?id=2036020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189</a><br><a href="https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)">https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)</a><br><a href="https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)">https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)">https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)">https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)</a><br><a href="https://ubuntu.com/security/notices/USN-5342-1">https://ubuntu.com/security/notices/USN-5342-1</a><br></details> |
| python3.5-minimal | CVE-2017-17522 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/102207">http://www.securityfocus.com/bid/102207</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17522">https://access.redhat.com/security/cve/CVE-2017-17522</a><br><a href="https://bugs.python.org/issue32367">https://bugs.python.org/issue32367</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">https://nvd.nist.gov/vuln/detail/CVE-2017-17522</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2017-17522">https://security-tracker.debian.org/tracker/CVE-2017-17522</a><br></details> |
| python3.5-minimal | CVE-2019-9674 | LOW | 3.5.3-1+deb9u3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9674">https://access.redhat.com/security/cve/CVE-2019-9674</a><br><a href="https://bugs.python.org/issue36260">https://bugs.python.org/issue36260</a><br><a href="https://bugs.python.org/issue36462">https://bugs.python.org/issue36462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674</a><br><a href="https://github.com/python/cpython/blob/master/Lib/zipfile.py">https://github.com/python/cpython/blob/master/Lib/zipfile.py</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">https://nvd.nist.gov/vuln/detail/CVE-2019-9674</a><br><a href="https://python-security.readthedocs.io/security.html#archives-and-zip-bomb">https://python-security.readthedocs.io/security.html#archives-and-zip-bomb</a><br><a href="https://security.netapp.com/advisory/ntap-20200221-0003/">https://security.netapp.com/advisory/ntap-20200221-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4428-1">https://ubuntu.com/security/notices/USN-4428-1</a><br><a href="https://ubuntu.com/security/notices/USN-4754-3">https://ubuntu.com/security/notices/USN-4754-3</a><br><a href="https://usn.ubuntu.com/4428-1/">https://usn.ubuntu.com/4428-1/</a><br><a href="https://www.python.org/news/security/">https://www.python.org/news/security/</a><br></details> |
| subversion | CVE-2020-17525 | HIGH | 1.9.5-1+deb9u5 | 1.9.5-1+deb9u6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-17525">https://access.redhat.com/security/cve/CVE-2020-17525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525</a><br><a href="https://linux.oracle.com/cve/CVE-2020-17525.html">https://linux.oracle.com/cve/CVE-2020-17525.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0507.html">https://linux.oracle.com/errata/ELSA-2021-0507.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17525">https://nvd.nist.gov/vuln/detail/CVE-2020-17525</a><br><a href="https://subversion.apache.org/security/CVE-2020-17525-advisory.txt">https://subversion.apache.org/security/CVE-2020-17525-advisory.txt</a><br><a href="https://ubuntu.com/security/notices/USN-5322-1">https://ubuntu.com/security/notices/USN-5322-1</a><br></details> |
| tar | CVE-2018-20482 | MEDIUM | 1.29b-1.1 | 1.29b-1.1+deb9u1 | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454</a><br><a href="http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html">http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a><br><a href="http://www.securityfocus.com/bid/106354">http://www.securityfocus.com/bid/106354</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20482">https://access.redhat.com/security/cve/CVE-2018-20482</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482</a><br><a href="https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html">https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html">https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html</a><br><a href="https://news.ycombinator.com/item?id=18745431">https://news.ycombinator.com/item?id=18745431</a><br><a href="https://security.gentoo.org/glsa/201903-05">https://security.gentoo.org/glsa/201903-05</a><br><a href="https://twitter.com/thatcks/status/1076166645708668928">https://twitter.com/thatcks/status/1076166645708668928</a><br><a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a><br><a href="https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug">https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug</a><br></details> |
| tar | CVE-2005-2541 | LOW | 1.29b-1.1 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a><br><a href="https://access.redhat.com/security/cve/CVE-2005-2541">https://access.redhat.com/security/cve/CVE-2005-2541</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br></details> |
| tar | CVE-2019-9923 | LOW | 1.29b-1.1 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a><br><a href="http://savannah.gnu.org/bugs/?55369">http://savannah.gnu.org/bugs/?55369</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9923">https://access.redhat.com/security/cve/CVE-2019-9923</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241">https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a><br></details> |
| tar | CVE-2021-20193 | LOW | 1.29b-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20193">https://access.redhat.com/security/cve/CVE-2021-20193</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
| tzdata | DLA-2797-1 | UNKNOWN | 2021a-0+deb9u1 | 2021a-0+deb9u2 | <details><summary>Expand...</summary></details> |
| tzdata | DLA-2963-1 | UNKNOWN | 2021a-0+deb9u1 | 2021a-0+deb9u3 | <details><summary>Expand...</summary></details> |
| unzip | CVE-2022-0529 | HIGH | 6.0-21+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0529">https://access.redhat.com/security/cve/CVE-2022-0529</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2051395">https://bugzilla.redhat.com/show_bug.cgi?id=2051395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529</a><br><a href="https://github.com/ByteHackr/unzip_poc">https://github.com/ByteHackr/unzip_poc</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">https://nvd.nist.gov/vuln/detail/CVE-2022-0529</a><br></details> |
| unzip | CVE-2022-0530 | HIGH | 6.0-21+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0530">https://access.redhat.com/security/cve/CVE-2022-0530</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2051395">https://bugzilla.redhat.com/show_bug.cgi?id=2051395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530</a><br><a href="https://github.com/ByteHackr/unzip_poc">https://github.com/ByteHackr/unzip_poc</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">https://nvd.nist.gov/vuln/detail/CVE-2022-0530</a><br></details> |
| unzip | CVE-2021-4217 | LOW | 6.0-21+deb9u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4217">https://access.redhat.com/security/cve/CVE-2021-4217</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217</a><br></details> |
| util-linux | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2016/02/27/1">http://www.openwall.com/lists/oss-security/2016/02/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/27/2">http://www.openwall.com/lists/oss-security/2016/02/27/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2779">https://access.redhat.com/security/cve/CVE-2016-2779</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922</a><br></details> |
| util-linux | CVE-2021-37600 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| util-linux | CVE-2022-0563 | LOW | 2.29.2-1+deb9u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| wget | CVE-2021-31879 | MEDIUM | 1.18-5+deb9u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-31879">https://access.redhat.com/security/cve/CVE-2021-31879</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31879">https://nvd.nist.gov/vuln/detail/CVE-2021-31879</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.8.dfsg-5 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
| zlib1g-dev | CVE-2018-25032 | HIGH | 1:1.2.8.dfsg-5 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
**node-pkg**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| ansi-regex | CVE-2021-3807 | MEDIUM | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3807">https://access.redhat.com/security/cve/CVE-2021-3807</a><br><a href="https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908">https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href="https://github.com/advisories/GHSA-93q8-gq69-wqmw">https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href="https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9">https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311">https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774">https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href="https://github.com/chalk/ansi-regex/releases/tag/v6.0.1">https://github.com/chalk/ansi-regex/releases/tag/v6.0.1</a><br><a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3807.html">https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br></details> |
| ansi-regex | CVE-2021-3807 | MEDIUM | 4.1.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3807">https://access.redhat.com/security/cve/CVE-2021-3807</a><br><a href="https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908">https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href="https://github.com/advisories/GHSA-93q8-gq69-wqmw">https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href="https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9">https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311">https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774">https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href="https://github.com/chalk/ansi-regex/releases/tag/v6.0.1">https://github.com/chalk/ansi-regex/releases/tag/v6.0.1</a><br><a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3807.html">https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br></details> |
| ansi-regex | CVE-2021-3807 | MEDIUM | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3807">https://access.redhat.com/security/cve/CVE-2021-3807</a><br><a href="https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908">https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href="https://github.com/advisories/GHSA-93q8-gq69-wqmw">https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href="https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9">https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311">https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774">https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href="https://github.com/chalk/ansi-regex/releases/tag/v6.0.1">https://github.com/chalk/ansi-regex/releases/tag/v6.0.1</a><br><a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3807.html">https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br></details> |
| hosted-git-info | CVE-2021-23362 | MEDIUM | 2.8.8 | 2.8.9, 3.0.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23362">https://access.redhat.com/security/cve/CVE-2021-23362</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-43f8-2h32-f4cj">https://github.com/advisories/GHSA-43f8-2h32-f4cj</a><br><a href="https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7">https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7</a><br><a href="https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01">https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01</a><br><a href="https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3">https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3</a><br><a href="https://github.com/npm/hosted-git-info/commits/v2">https://github.com/npm/hosted-git-info/commits/v2</a><br><a href="https://github.com/npm/hosted-git-info/pull/76">https://github.com/npm/hosted-git-info/pull/76</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23362.html">https://linux.oracle.com/cve/CVE-2021-23362.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3074.html">https://linux.oracle.com/errata/ELSA-2021-3074.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23362">https://nvd.nist.gov/vuln/detail/CVE-2021-23362</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356</a><br><a href="https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355">https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355</a><br></details> |
| json-schema | CVE-2021-3918 | MEDIUM | 0.2.3 | 0.4.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3918">https://access.redhat.com/security/cve/CVE-2021-3918</a><br><a href="https://github.com/advisories/GHSA-896r-f27r-55mw">https://github.com/advisories/GHSA-896r-f27r-55mw</a><br><a href="https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741">https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741</a><br><a href="https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a">https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a</a><br><a href="https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa">https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa</a><br><a href="https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9">https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3918.html">https://linux.oracle.com/cve/CVE-2021-3918.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a><br></details> |
| minimist | CVE-2021-44906 | HIGH | 1.2.5 | 1.2.6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-44906">https://access.redhat.com/security/cve/CVE-2021-44906</a><br><a href="https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip">https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip</a><br><a href="https://github.com/advisories/GHSA-xvch-5gv4-984h">https://github.com/advisories/GHSA-xvch-5gv4-984h</a><br><a href="https://github.com/substack/minimist/blob/master/index.js#L69">https://github.com/substack/minimist/blob/master/index.js#L69</a><br><a href="https://github.com/substack/minimist/issues/164">https://github.com/substack/minimist/issues/164</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a><br><a href="https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068">https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068</a><br></details> |
| node-fetch | CVE-2022-0235 | HIGH | 2.6.1 | 2.6.7, 3.1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0235">https://access.redhat.com/security/cve/CVE-2022-0235</a><br><a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a><br><a href="https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10">https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10</a><br><a href="https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60">https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60</a><br><a href="https://github.com/node-fetch/node-fetch/pull/1453">https://github.com/node-fetch/node-fetch/pull/1453</a><br><a href="https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7">https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7</a><br><a href="https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/">https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0235">https://nvd.nist.gov/vuln/detail/CVE-2022-0235</a><br></details> |
| path-parse | CVE-2021-23343 | MEDIUM | 1.0.6 | 1.0.7 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23343">https://access.redhat.com/security/cve/CVE-2021-23343</a><br><a href="https://github.com/advisories/GHSA-hj48-42vr-x3v9">https://github.com/advisories/GHSA-hj48-42vr-x3v9</a><br><a href="https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7">https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7</a><br><a href="https://github.com/jbgutierrez/path-parse/issues/8">https://github.com/jbgutierrez/path-parse/issues/8</a><br><a href="https://github.com/jbgutierrez/path-parse/pull/10">https://github.com/jbgutierrez/path-parse/pull/10</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23343.html">https://linux.oracle.com/cve/CVE-2021-23343.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23343">https://nvd.nist.gov/vuln/detail/CVE-2021-23343</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028</a><br><a href="https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067">https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067</a><br></details> |
| ssri | CVE-2021-27290 | HIGH | 6.0.1 | 8.0.1, 7.1.1, 6.0.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27290">https://access.redhat.com/security/cve/CVE-2021-27290</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290</a><br><a href="https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf">https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf</a><br><a href="https://github.com/advisories/GHSA-vx3p-948g-6vhq">https://github.com/advisories/GHSA-vx3p-948g-6vhq</a><br><a href="https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2">https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2</a><br><a href="https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1">https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1</a><br><a href="https://github.com/npm/ssri/pull/20#issuecomment-842677644">https://github.com/npm/ssri/pull/20#issuecomment-842677644</a><br><a href="https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf">https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27290.html">https://linux.oracle.com/cve/CVE-2021-27290.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3074.html">https://linux.oracle.com/errata/ELSA-2021-3074.html</a><br><a href="https://npmjs.com">https://npmjs.com</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27290">https://nvd.nist.gov/vuln/detail/CVE-2021-27290</a><br><a href="https://www.npmjs.com/package/ssri">https://www.npmjs.com/package/ssri</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| strapi | CVE-2022-0764 | MEDIUM | 3.6.8 | 4.1.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-xrjf-phvv-r4vr">https://github.com/advisories/GHSA-xrjf-phvv-r4vr</a><br><a href="https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13">https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13</a><br><a href="https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c">https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c</a><br><a href="https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5">https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0764">https://nvd.nist.gov/vuln/detail/CVE-2022-0764</a><br><a href="https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c">https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c</a><br></details> |
| tar | CVE-2021-32803 | HIGH | 4.4.13 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32803">https://access.redhat.com/security/cve/CVE-2021-32803</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-r628-mhmh-qjhw">https://github.com/advisories/GHSA-r628-mhmh-qjhw</a><br><a href="https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20">https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw">https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32803.html">https://linux.oracle.com/cve/CVE-2021-32803.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32803">https://nvd.nist.gov/vuln/detail/CVE-2021-32803</a><br><a href="https://www.npmjs.com/advisories/1771">https://www.npmjs.com/advisories/1771</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-32804 | HIGH | 4.4.13 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32804">https://access.redhat.com/security/cve/CVE-2021-32804</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-3jfq-g458-7qm9">https://github.com/advisories/GHSA-3jfq-g458-7qm9</a><br><a href="https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4">https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9">https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32804.html">https://linux.oracle.com/cve/CVE-2021-32804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32804">https://nvd.nist.gov/vuln/detail/CVE-2021-32804</a><br><a href="https://www.npmjs.com/advisories/1770">https://www.npmjs.com/advisories/1770</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-37701 | HIGH | 4.4.13 | 6.1.7, 5.0.8, 4.4.16 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37701">https://access.redhat.com/security/cve/CVE-2021-37701</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-9r2w-394v-53qc">https://github.com/advisories/GHSA-9r2w-394v-53qc</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37701.html">https://linux.oracle.com/cve/CVE-2021-37701.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37701">https://nvd.nist.gov/vuln/detail/CVE-2021-37701</a><br><a href="https://www.debian.org/security/2021/dsa-5008">https://www.debian.org/security/2021/dsa-5008</a><br><a href="https://www.npmjs.com/advisories/1779">https://www.npmjs.com/advisories/1779</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-37712 | HIGH | 4.4.13 | 6.1.9, 5.0.10, 4.4.18 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37712">https://access.redhat.com/security/cve/CVE-2021-37712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-qq89-hq3f-393p">https://github.com/advisories/GHSA-qq89-hq3f-393p</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p">https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37712.html">https://linux.oracle.com/cve/CVE-2021-37712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37712">https://nvd.nist.gov/vuln/detail/CVE-2021-37712</a><br><a href="https://www.debian.org/security/2021/dsa-5008">https://www.debian.org/security/2021/dsa-5008</a><br><a href="https://www.npmjs.com/advisories/1780">https://www.npmjs.com/advisories/1780</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-37713 | HIGH | 4.4.13 | 6.1.9, 5.0.10, 4.4.18 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37713">https://access.redhat.com/security/cve/CVE-2021-37713</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-5955-9wpr-37jh">https://github.com/advisories/GHSA-5955-9wpr-37jh</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh">https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37713">https://nvd.nist.gov/vuln/detail/CVE-2021-37713</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-37701 | HIGH | 6.1.4 | 6.1.7, 5.0.8, 4.4.16 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37701">https://access.redhat.com/security/cve/CVE-2021-37701</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-9r2w-394v-53qc">https://github.com/advisories/GHSA-9r2w-394v-53qc</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37701.html">https://linux.oracle.com/cve/CVE-2021-37701.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37701">https://nvd.nist.gov/vuln/detail/CVE-2021-37701</a><br><a href="https://www.debian.org/security/2021/dsa-5008">https://www.debian.org/security/2021/dsa-5008</a><br><a href="https://www.npmjs.com/advisories/1779">https://www.npmjs.com/advisories/1779</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-37712 | HIGH | 6.1.4 | 6.1.9, 5.0.10, 4.4.18 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37712">https://access.redhat.com/security/cve/CVE-2021-37712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-qq89-hq3f-393p">https://github.com/advisories/GHSA-qq89-hq3f-393p</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p">https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37712.html">https://linux.oracle.com/cve/CVE-2021-37712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37712">https://nvd.nist.gov/vuln/detail/CVE-2021-37712</a><br><a href="https://www.debian.org/security/2021/dsa-5008">https://www.debian.org/security/2021/dsa-5008</a><br><a href="https://www.npmjs.com/advisories/1780">https://www.npmjs.com/advisories/1780</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| tar | CVE-2021-37713 | HIGH | 6.1.4 | 6.1.9, 5.0.10, 4.4.18 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37713">https://access.redhat.com/security/cve/CVE-2021-37713</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-5955-9wpr-37jh">https://github.com/advisories/GHSA-5955-9wpr-37jh</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh">https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37713">https://nvd.nist.gov/vuln/detail/CVE-2021-37713</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| urijs | CVE-2022-0613 | MEDIUM | 1.19.7 | 1.19.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0613">https://access.redhat.com/security/cve/CVE-2022-0613</a><br><a href="https://github.com/advisories/GHSA-gcv8-gh4r-25x6">https://github.com/advisories/GHSA-gcv8-gh4r-25x6</a><br><a href="https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f">https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f</a><br><a href="https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083">https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0613">https://nvd.nist.gov/vuln/detail/CVE-2022-0613</a><br></details> |
| urijs | CVE-2022-0868 | MEDIUM | 1.19.7 | 1.19.10 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-8h2f-7jc4-7m3m">https://github.com/advisories/GHSA-8h2f-7jc4-7m3m</a><br><a href="https://github.com/medialize/URI.js/releases/tag/v1.19.10">https://github.com/medialize/URI.js/releases/tag/v1.19.10</a><br><a href="https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509">https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509</a><br><a href="https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02">https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0868">https://nvd.nist.gov/vuln/detail/CVE-2022-0868</a><br></details> |
| urijs | CVE-2022-24723 | MEDIUM | 1.19.7 | 1.19.9 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24723">https://access.redhat.com/security/cve/CVE-2022-24723</a><br><a href="https://github.com/advisories/GHSA-gmv4-r438-p67f">https://github.com/advisories/GHSA-gmv4-r438-p67f</a><br><a href="https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316">https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316</a><br><a href="https://github.com/medialize/URI.js/releases/tag/v1.19.9">https://github.com/medialize/URI.js/releases/tag/v1.19.9</a><br><a href="https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f">https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f</a><br><a href="https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316">https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316</a><br><a href="https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/">https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24723">https://nvd.nist.gov/vuln/detail/CVE-2022-24723</a><br></details> |
| y18n | CVE-2020-7774 | HIGH | 4.0.0 | 5.0.5, 4.0.1, 3.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7774">https://access.redhat.com/security/cve/CVE-2020-7774</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-c4w7-xm78-47vh">https://github.com/advisories/GHSA-c4w7-xm78-47vh</a><br><a href="https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25">https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25</a><br><a href="https://github.com/yargs/y18n/issues/96">https://github.com/yargs/y18n/issues/96</a><br><a href="https://github.com/yargs/y18n/pull/108">https://github.com/yargs/y18n/pull/108</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7774.html">https://linux.oracle.com/cve/CVE-2020-7774.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0551.html">https://linux.oracle.com/errata/ELSA-2021-0551.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">https://nvd.nist.gov/vuln/detail/CVE-2020-7774</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306</a><br><a href="https://snyk.io/vuln/SNYK-JS-Y18N-1021887">https://snyk.io/vuln/SNYK-JS-Y18N-1021887</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/postgresql:v14.2.0@sha256:29d271601a53989aa4d6d0350f00ed36c7d20e920a9c744d6c01b81aee6638a1 (debian 10.12)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| bash | CVE-2019-18276 | LOW | 5.0-4 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html">http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18276">https://access.redhat.com/security/cve/CVE-2019-18276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a><br><a href="https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff">https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a><br><a href="https://linux.oracle.com/cve/CVE-2019-18276.html">https://linux.oracle.com/cve/CVE-2019-18276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1679.html">https://linux.oracle.com/errata/ELSA-2021-1679.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">https://nvd.nist.gov/vuln/detail/CVE-2019-18276</a><br><a href="https://security.gentoo.org/glsa/202105-34">https://security.gentoo.org/glsa/202105-34</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0003/">https://security.netapp.com/advisory/ntap-20200430-0003/</a><br><a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a><br></details> |
| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| coreutils | CVE-2016-2781 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| coreutils | CVE-2017-18018 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18018">https://access.redhat.com/security/cve/CVE-2017-18018</a><br></details> |
| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33560">https://access.redhat.com/security/cve/CVE-2021-33560</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href="https://dev.gnupg.org/T5305">https://dev.gnupg.org/T5305</a><br><a href="https://dev.gnupg.org/T5328">https://dev.gnupg.org/T5328</a><br><a href="https://dev.gnupg.org/T5466">https://dev.gnupg.org/T5466</a><br><a href="https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61">https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33560.html">https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4409.html">https://linux.oracle.com/errata/ELSA-2021-4409.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">https://nvd.nist.gov/vuln/detail/CVE-2021-33560</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/10/02/2">http://www.openwall.com/lists/oss-security/2019/10/02/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13627">https://access.redhat.com/security/cve/CVE-2019-13627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</a><br><a href="https://dev.gnupg.org/T4683">https://dev.gnupg.org/T4683</a><br><a href="https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5">https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13627.html">https://linux.oracle.com/cve/CVE-2019-13627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4482.html">https://linux.oracle.com/errata/ELSA-2020-4482.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html</a><br><a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">https://security-tracker.debian.org/tracker/CVE-2019-13627</a><br><a href="https://security.gentoo.org/glsa/202003-32">https://security.gentoo.org/glsa/202003-32</a><br><a href="https://ubuntu.com/security/notices/USN-4236-1">https://ubuntu.com/security/notices/USN-4236-1</a><br><a href="https://ubuntu.com/security/notices/USN-4236-2">https://ubuntu.com/security/notices/USN-4236-2</a><br><a href="https://ubuntu.com/security/notices/USN-4236-3">https://ubuntu.com/security/notices/USN-4236-3</a><br><a href="https://usn.ubuntu.com/4236-1/">https://usn.ubuntu.com/4236-1/</a><br><a href="https://usn.ubuntu.com/4236-2/">https://usn.ubuntu.com/4236-2/</a><br><a href="https://usn.ubuntu.com/4236-3/">https://usn.ubuntu.com/4236-3/</a><br></details> |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6829">https://access.redhat.com/security/cve/CVE-2018-6829</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a><br><a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4209">https://access.redhat.com/security/cve/CVE-2021-4209</a><br></details> |
| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a><br><a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a><br><a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a><br><a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a><br><a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a><br><a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a><br><a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a><br><a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a><br><a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a><br><a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a><br><a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a><br><a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a><br><a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a><br><a href="http://osvdb.org/74829">http://osvdb.org/74829</a><br><a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a><br><a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a><br><a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a><br><a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a><br><a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a><br><a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a><br><a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a><br><a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a><br><a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a><br><a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a><br><a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a><br><a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a><br><a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a><br><a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a><br><a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a><br><a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a><br><a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a><br><a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a><br><a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a><br><a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a><br><a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a><br><a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a><br><a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a><br><a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a><br><a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a><br><a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a><br><a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a><br><a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a><br><a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a><br><a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a><br><a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a><br><a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a><br><a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a><br><a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a><br><a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a><br><a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a><br><a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-3389">https://access.redhat.com/security/cve/CVE-2011-3389</a><br><a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a><br><a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a><br><a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a><br><a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a><br><a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a><br><a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a><br><a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a><br></details> |
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290</a><br><a href="https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5">https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5</a><br><a href="https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de">https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de</a><br><a href="https://gitlab.com/libidn/libidn2/merge_requests/71">https://gitlab.com/libidn/libidn2/merge_requests/71</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/</a><br><a href="https://security.gentoo.org/glsa/202003-63">https://security.gentoo.org/glsa/202003-63</a><br><a href="https://ubuntu.com/security/notices/USN-4168-1">https://ubuntu.com/security/notices/USN-4168-1</a><br><a href="https://usn.ubuntu.com/4168-1/">https://usn.ubuntu.com/4168-1/</a><br></details> |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br></details> |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br></details> |
| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br></details> |
| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17543">https://access.redhat.com/security/cve/CVE-2019-17543</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a><br><a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a><br><a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a><br><a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a><br><a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a><br><a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11080">https://access.redhat.com/security/cve/CVE-2020-11080</a><br><a href="https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090">https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090</a><br><a href="https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394">https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394</a><br><a href="https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr">https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11080.html">https://linux.oracle.com/cve/CVE-2020-11080.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5765.html">https://linux.oracle.com/errata/ELSA-2020-5765.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">https://nvd.nist.gov/vuln/detail/CVE-2020-11080</a><br><a href="https://www.debian.org/security/2020/dsa-4696">https://www.debian.org/security/2020/dsa-4696</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html</a><br><a href="http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html">http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3624">https://access.redhat.com/errata/RHSA-2019:3624</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9893">https://access.redhat.com/security/cve/CVE-2019-9893</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893</a><br><a href="https://github.com/seccomp/libseccomp/issues/139">https://github.com/seccomp/libseccomp/issues/139</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9893.html">https://linux.oracle.com/cve/CVE-2019-9893.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3624.html">https://linux.oracle.com/errata/ELSA-2019-3624.html</a><br><a href="https://seclists.org/oss-sec/2019/q1/179">https://seclists.org/oss-sec/2019/q1/179</a><br><a href="https://security.gentoo.org/glsa/201904-18">https://security.gentoo.org/glsa/201904-18</a><br><a href="https://ubuntu.com/security/notices/USN-4001-1">https://ubuntu.com/security/notices/USN-4001-1</a><br><a href="https://ubuntu.com/security/notices/USN-4001-2">https://ubuntu.com/security/notices/USN-4001-2</a><br><a href="https://usn.ubuntu.com/4001-1/">https://usn.ubuntu.com/4001-1/</a><br><a href="https://usn.ubuntu.com/4001-2/">https://usn.ubuntu.com/4001-2/</a><br><a href="https://www.openwall.com/lists/oss-security/2019/03/15/1">https://www.openwall.com/lists/oss-security/2019/03/15/1</a><br></details> |
| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36084">https://access.redhat.com/security/cve/CVE-2021-36084</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084</a><br><a href="https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3">https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36084.html">https://linux.oracle.com/cve/CVE-2021-36084.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36085">https://access.redhat.com/security/cve/CVE-2021-36085</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085</a><br><a href="https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba">https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36085.html">https://linux.oracle.com/cve/CVE-2021-36085.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36086">https://access.redhat.com/security/cve/CVE-2021-36086</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36086.html">https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details> |
| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36087">https://access.redhat.com/security/cve/CVE-2021-36087</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href="https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521">https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36087.html">https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br></details> |
| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19603">https://access.redhat.com/security/cve/CVE-2019-19603</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603</a><br><a href="https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13">https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19603.html">https://linux.oracle.com/cve/CVE-2019-19603.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4396.html">https://linux.oracle.com/errata/ELSA-2021-4396.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20191223-0001/">https://security.netapp.com/advisory/ntap-20191223-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.sqlite.org/">https://www.sqlite.org/</a><br></details> |
| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19645">https://access.redhat.com/security/cve/CVE-2019-19645</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645</a><br><a href="https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06">https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06</a><br><a href="https://security.netapp.com/advisory/ntap-20191223-0001/">https://security.netapp.com/advisory/ntap-20191223-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19924">https://access.redhat.com/security/cve/CVE-2019-19924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924</a><br><a href="https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3">https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19924.html">https://linux.oracle.com/cve/CVE-2019-19924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20200114-0003/">https://security.netapp.com/advisory/ntap-20200114-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4298-1">https://ubuntu.com/security/notices/USN-4298-1</a><br><a href="https://usn.ubuntu.com/4298-1/">https://usn.ubuntu.com/4298-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br></details> |
| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/19">http://seclists.org/fulldisclosure/2020/Nov/19</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/20">http://seclists.org/fulldisclosure/2020/Nov/20</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/22">http://seclists.org/fulldisclosure/2020/Nov/22</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13631">https://access.redhat.com/security/cve/CVE-2020-13631</a><br><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1080459">https://bugs.chromium.org/p/chromium/issues/detail?id=1080459</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13631.html">https://linux.oracle.com/cve/CVE-2020-13631.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4442.html">https://linux.oracle.com/errata/ELSA-2020-4442.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200608-0002/">https://security.netapp.com/advisory/ntap-20200608-0002/</a><br><a href="https://sqlite.org/src/info/eca0ba2cf4c0fdf7">https://sqlite.org/src/info/eca0ba2cf4c0fdf7</a><br><a href="https://support.apple.com/kb/HT211843">https://support.apple.com/kb/HT211843</a><br><a href="https://support.apple.com/kb/HT211844">https://support.apple.com/kb/HT211844</a><br><a href="https://support.apple.com/kb/HT211850">https://support.apple.com/kb/HT211850</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT211935">https://support.apple.com/kb/HT211935</a><br><a href="https://support.apple.com/kb/HT211952">https://support.apple.com/kb/HT211952</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-45346">https://access.redhat.com/security/cve/CVE-2021-45346</a><br><a href="https://github.com/guyinatuxedo/sqlite3_record_leaking">https://github.com/guyinatuxedo/sqlite3_record_leaking</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0001/">https://security.netapp.com/advisory/ntap-20220303-0001/</a><br><a href="https://sqlite.org/forum/forumpost/53de8864ba114bf6">https://sqlite.org/forum/forumpost/53de8864ba114bf6</a><br></details> |
| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19244">https://access.redhat.com/security/cve/CVE-2019-19244</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244</a><br><a href="https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348">https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348</a><br><a href="https://ubuntu.com/security/notices/USN-4205-1">https://ubuntu.com/security/notices/USN-4205-1</a><br><a href="https://usn.ubuntu.com/4205-1/">https://usn.ubuntu.com/4205-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br></details> |
| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11656">https://access.redhat.com/security/cve/CVE-2020-11656</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.sqlite.org/src/info/d09f8c3621d5f7f8">https://www.sqlite.org/src/info/d09f8c3621d5f7f8</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br><a href="https://www3.sqlite.org/cgi/src/info/b64674919f673602">https://www3.sqlite.org/cgi/src/info/b64674919f673602</a><br></details> |
| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">https://nvd.nist.gov/vuln/detail/CVE-2021-36690</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.sqlite.org/forum/forumpost/718c0a8d17">https://www.sqlite.org/forum/forumpost/718c0a8d17</a><br></details> |
| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-13115">https://access.redhat.com/security/cve/CVE-2019-13115</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow/">https://blog.semmle.com/libssh2-integer-overflow/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115</a><br><a href="https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa">https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa</a><br><a href="https://github.com/libssh2/libssh2/pull/350">https://github.com/libssh2/libssh2/pull/350</a><br><a href="https://libssh2.org/changes.html">https://libssh2.org/changes.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0002/">https://security.netapp.com/advisory/ntap-20190806-0002/</a><br><a href="https://support.f5.com/csp/article/K13322484">https://support.f5.com/csp/article/K13322484</a><br><a href="https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17498">https://access.redhat.com/security/cve/CVE-2019-17498</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/">https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498</a><br><a href="https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498">https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498</a><br><a href="https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480">https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480</a><br><a href="https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c">https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c</a><br><a href="https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94">https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17498.html">https://linux.oracle.com/cve/CVE-2019-17498.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3915.html">https://linux.oracle.com/errata/ELSA-2020-3915.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">https://nvd.nist.gov/vuln/detail/CVE-2019-17498</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000654">https://access.redhat.com/security/cve/CVE-2018-1000654</a><br><a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u3 | | <details><summary>Expand...</summary><a href="http://xmlsoft.org/news.html">http://xmlsoft.org/news.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16932">https://access.redhat.com/security/cve/CVE-2017-16932</a><br><a href="https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html">https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=759579">https://bugzilla.gnome.org/show_bug.cgi?id=759579</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932</a><br><a href="https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961">https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961</a><br><a href="https://github.com/sparklemotion/nokogiri/issues/1714">https://github.com/sparklemotion/nokogiri/issues/1714</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html">https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html</a><br><a href="https://ubuntu.com/security/notices/USN-3504-1">https://ubuntu.com/security/notices/USN-3504-1</a><br><a href="https://ubuntu.com/security/notices/USN-3504-2">https://ubuntu.com/security/notices/USN-3504-2</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/usn/usn-3504-1/">https://usn.ubuntu.com/usn/usn-3504-1/</a><br></details> |
| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u3 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94347">http://www.securityfocus.com/bid/94347</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9318">https://access.redhat.com/security/cve/CVE-2016-9318</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=772726">https://bugzilla.gnome.org/show_bug.cgi?id=772726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318</a><br><a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://ubuntu.com/security/notices/USN-3739-2">https://ubuntu.com/security/notices/USN-3739-2</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a><br></details> |
| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2015-9019">https://access.redhat.com/security/cve/CVE-2015-9019</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=758400">https://bugzilla.gnome.org/show_bug.cgi?id=758400</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=934119">https://bugzilla.suse.com/show_bug.cgi?id=934119</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019</a><br></details> |
| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| locales | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3998">https://access.redhat.com/security/cve/CVE-2021-3998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c">https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a><br><a href="https://access.redhat.com/security/cve/CVE-2005-2541">https://access.redhat.com/security/cve/CVE-2005-2541</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br></details> |
| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a><br><a href="http://savannah.gnu.org/bugs/?55369">http://savannah.gnu.org/bugs/?55369</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9923">https://access.redhat.com/security/cve/CVE-2019-9923</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241">https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a><br></details> |
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20193">https://access.redhat.com/security/cve/CVE-2021-20193</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br></details> |
| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
**jar**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43784">https://access.redhat.com/security/cve/CVE-2021-43784</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2241">https://bugs.chromium.org/p/project-zero/issues/detail?id=2241</a><br><a href="https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554">https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554</a><br><a href="https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae">https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae</a><br><a href="https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed">https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f">https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">https://nvd.nist.gov/vuln/detail/CVE-2021-43784</a><br></details> |