| apt | CVE-2011-3374 | LOW | 2.2.4 |  | Expand...https://access.redhat.com/security/cve/cve-2011-3374https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
 https://seclists.org/fulldisclosure/2011/Sep/221
 https://security-tracker.debian.org/tracker/CVE-2011-3374
 https://snyk.io/vuln/SNYK-LINUX-APT-116518
 https://ubuntu.com/security/CVE-2011-3374
 
 | 
  | bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | coreutils | CVE-2016-2781 | LOW | 8.32-4 |  | Expand...http://seclists.org/oss-sec/2016/q1/452http://www.openwall.com/lists/oss-security/2016/02/28/2
 http://www.openwall.com/lists/oss-security/2016/02/28/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lore.kernel.org/patchwork/patch/793178/
 
 | 
  | coreutils | CVE-2017-18018 | LOW | 8.32-4 |  | Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
 | 
  | curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22945.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
 https://hackerone.com/reports/1269242
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22946.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22947.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22922.htmlhttps://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22923.htmlhttps://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22924.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | git | CVE-2018-1000021 | LOW | 1:2.30.2-1 |  | Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
 
 | 
  | git | CVE-2022-24975 | LOW | 1:2.30.2-1 |  | Expand...https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
 
 | 
  | git-man | CVE-2018-1000021 | LOW | 1:2.30.2-1 |  | Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
 
 | 
  | git-man | CVE-2022-24975 | LOW | 1:2.30.2-1 |  | Expand...https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
 
 | 
  | imagemagick | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | imagemagick | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | imagemagick-6.q16 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | imagemagick-6.q16 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6.q16 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6.q16 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick-6.q16 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick-6.q16 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick-6.q16 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick-6.q16 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick-6.q16 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick-6.q16 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick-6.q16 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick-6.q16 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
 
 | 
  | libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2ehttps://bugs.chromium.org/p/aomedia/issues/detail?id=3000
 
 | 
  | libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
 
 | 
  | libaom0 | CVE-2020-36131 | HIGH | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
 
 | 
  | libaom0 | CVE-2020-36133 | HIGH | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
 
 | 
  | libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
 
 | 
  | libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
 https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
 
 | 
  | libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 |  | Expand...https://access.redhat.com/security/cve/cve-2011-3374https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
 https://seclists.org/fulldisclosure/2011/Sep/221
 https://security-tracker.debian.org/tracker/CVE-2011-3374
 https://snyk.io/vuln/SNYK-LINUX-APT-116518
 https://ubuntu.com/security/CVE-2011-3374
 
 | 
  | libavahi-client3 | CVE-2021-3468 | MEDIUM | 0.8-5 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
 https://ubuntu.com/security/notices/USN-5008-1
 https://ubuntu.com/security/notices/USN-5008-2
 
 | 
  | libavahi-client3 | CVE-2021-3502 | MEDIUM | 0.8-5 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946914https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502
 https://github.com/lathiat/avahi/issues/338
 https://github.com/lathiat/avahi/pull/324
 https://ubuntu.com/security/notices/USN-5008-1
 
 | 
  | libavahi-common-data | CVE-2021-3468 | MEDIUM | 0.8-5 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
 https://ubuntu.com/security/notices/USN-5008-1
 https://ubuntu.com/security/notices/USN-5008-2
 
 | 
  | libavahi-common-data | CVE-2021-3502 | MEDIUM | 0.8-5 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946914https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502
 https://github.com/lathiat/avahi/issues/338
 https://github.com/lathiat/avahi/pull/324
 https://ubuntu.com/security/notices/USN-5008-1
 
 | 
  | libavahi-common3 | CVE-2021-3468 | MEDIUM | 0.8-5 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
 https://ubuntu.com/security/notices/USN-5008-1
 https://ubuntu.com/security/notices/USN-5008-2
 
 | 
  | libavahi-common3 | CVE-2021-3502 | MEDIUM | 0.8-5 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946914https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502
 https://github.com/lathiat/avahi/issues/338
 https://github.com/lathiat/avahi/pull/324
 https://ubuntu.com/security/notices/USN-5008-1
 
 | 
  | libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 |  | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc-dev-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-dev-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-dev-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-dev-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 |  | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc6 | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6 | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6 | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 |  | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc6-dev | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6-dev | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6-dev | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6-dev | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6-dev | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc6-dev | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6-dev | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc6-dev | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc6-dev | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc6-dev | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc6-dev | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6-dev | CVE-2021-43396 | LOW | 2.31-13+deb11u2 |  | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libcups2 | CVE-2014-8166 | LOW | 2.3.3op2-3+deb11u1 |  | Expand...http://www.openwall.com/lists/oss-security/2015/03/24/15http://www.openwall.com/lists/oss-security/2015/03/24/2
 http://www.securityfocus.com/bid/73300
 https://bugzilla.redhat.com/show_bug.cgi?id=1084577
 
 | 
  | libcurl3-gnutls | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22945.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
 https://hackerone.com/reports/1269242
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl3-gnutls | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22946.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22947.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl3-gnutls | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libcurl3-gnutls | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22922.htmlhttps://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl3-gnutls | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22923.htmlhttps://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl3-gnutls | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22924.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22945.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
 https://hackerone.com/reports/1269242
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22946.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22947.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22922.htmlhttps://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22923.htmlhttps://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://curl.se/docs/CVE-2021-22924.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libde265-0 | CVE-2020-21598 | HIGH | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/237
 | 
  | libde265-0 | CVE-2021-36409 | HIGH | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/300
 | 
  | libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/233
 | 
  | libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/239
 | 
  | libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/236
 | 
  | libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/238
 | 
  | libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/235
 | 
  | libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/243
 | 
  | libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/241
 | 
  | libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/242
 | 
  | libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/240
 | 
  | libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/231
 | 
  | libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/234
 | 
  | libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/232
 | 
  | libde265-0 | CVE-2021-35452 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/298
 | 
  | libde265-0 | CVE-2021-36408 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/299
 | 
  | libde265-0 | CVE-2021-36410 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/301
 | 
  | libde265-0 | CVE-2021-36411 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/302
 | 
  | libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2+deb11u2 |  | Expand...http://openwall.com/lists/oss-security/2013/02/22/3http://seclists.org/fulldisclosure/2021/Oct/61
 http://seclists.org/fulldisclosure/2021/Oct/62
 http://seclists.org/fulldisclosure/2021/Oct/63
 http://seclists.org/fulldisclosure/2021/Sep/33
 http://seclists.org/fulldisclosure/2021/Sep/34
 http://seclists.org/fulldisclosure/2021/Sep/35
 http://seclists.org/fulldisclosure/2021/Sep/38
 http://seclists.org/fulldisclosure/2021/Sep/39
 http://seclists.org/fulldisclosure/2021/Sep/40
 http://securitytracker.com/id?1028213
 http://www.openwall.com/lists/oss-security/2013/04/12/6
 http://www.openwall.com/lists/oss-security/2021/10/07/4
 http://www.osvdb.org/90634
 http://www.securityfocus.com/bid/58233
 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
 https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
 https://security.gentoo.org/glsa/201701-21
 https://support.apple.com/kb/HT212804
 https://support.apple.com/kb/HT212805
 https://support.apple.com/kb/HT212807
 https://support.apple.com/kb/HT212814
 https://support.apple.com/kb/HT212815
 https://support.apple.com/kb/HT212819
 
 | 
  | libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560https://dev.gnupg.org/T5305
 https://dev.gnupg.org/T5328
 https://dev.gnupg.org/T5466
 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
 https://eprint.iacr.org/2021/923
 https://linux.oracle.com/cve/CVE-2021-33560.html
 https://linux.oracle.com/errata/ELSA-2021-4409.html
 https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
 https://ubuntu.com/security/notices/USN-5080-1
 https://ubuntu.com/security/notices/USN-5080-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 |  | Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamalhttps://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
 https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
 https://www.oracle.com/security-alerts/cpujan2020.html
 
 | 
  | libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 |  | Expand... | 
  | libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 |  | Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
 http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
 http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
 http://curl.haxx.se/docs/adv_20120124B.html
 http://downloads.asterisk.org/pub/security/AST-2016-001.html
 http://ekoparty.org/2011/juliano-rizzo.php
 http://eprint.iacr.org/2004/111
 http://eprint.iacr.org/2006/136
 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
 http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
 http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
 http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
 http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
 http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
 http://marc.info/?l=bugtraq&m=132750579901589&w=2
 http://marc.info/?l=bugtraq&m=132872385320240&w=2
 http://marc.info/?l=bugtraq&m=133365109612558&w=2
 http://marc.info/?l=bugtraq&m=133728004526190&w=2
 http://marc.info/?l=bugtraq&m=134254866602253&w=2
 http://marc.info/?l=bugtraq&m=134254957702612&w=2
 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
 http://osvdb.org/74829
 http://rhn.redhat.com/errata/RHSA-2012-0508.html
 http://rhn.redhat.com/errata/RHSA-2013-1455.html
 http://secunia.com/advisories/45791
 http://secunia.com/advisories/47998
 http://secunia.com/advisories/48256
 http://secunia.com/advisories/48692
 http://secunia.com/advisories/48915
 http://secunia.com/advisories/48948
 http://secunia.com/advisories/49198
 http://secunia.com/advisories/55322
 http://secunia.com/advisories/55350
 http://secunia.com/advisories/55351
 http://security.gentoo.org/glsa/glsa-201203-02.xml
 http://security.gentoo.org/glsa/glsa-201406-32.xml
 http://support.apple.com/kb/HT4999
 http://support.apple.com/kb/HT5001
 http://support.apple.com/kb/HT5130
 http://support.apple.com/kb/HT5281
 http://support.apple.com/kb/HT5501
 http://support.apple.com/kb/HT6150
 http://technet.microsoft.com/security/advisory/2588513
 http://vnhacker.blogspot.com/2011/09/beast.html
 http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
 http://www.debian.org/security/2012/dsa-2398
 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
 http://www.ibm.com/developerworks/java/jdk/alerts/
 http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
 http://www.insecure.cl/Beast-SSL.rar
 http://www.kb.cert.org/vuls/id/864643
 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
 http://www.opera.com/docs/changelogs/mac/1151/
 http://www.opera.com/docs/changelogs/mac/1160/
 http://www.opera.com/docs/changelogs/unix/1151/
 http://www.opera.com/docs/changelogs/unix/1160/
 http://www.opera.com/docs/changelogs/windows/1151/
 http://www.opera.com/docs/changelogs/windows/1160/
 http://www.opera.com/support/kb/view/1004/
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
 http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
 http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
 http://www.redhat.com/support/errata/RHSA-2011-1384.html
 http://www.redhat.com/support/errata/RHSA-2012-0006.html
 http://www.securityfocus.com/bid/49388
 http://www.securityfocus.com/bid/49778
 http://www.securitytracker.com/id/1029190
 http://www.securitytracker.com/id?1025997
 http://www.securitytracker.com/id?1026103
 http://www.securitytracker.com/id?1026704
 http://www.ubuntu.com/usn/USN-1263-1
 http://www.us-cert.gov/cas/techalerts/TA12-010A.html
 https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
 https://bugzilla.novell.com/show_bug.cgi?id=719047
 https://bugzilla.redhat.com/show_bug.cgi?id=737506
 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
 https://hermes.opensuse.org/messages/13154861
 https://hermes.opensuse.org/messages/13155432
 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
 https://linux.oracle.com/cve/CVE-2011-3389.html
 https://linux.oracle.com/errata/ELSA-2011-1380.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
 https://ubuntu.com/security/notices/USN-1263-1
 
 | 
  | libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libheif1 | CVE-2020-23109 | HIGH | 1.11.0-1 |  | Expand...https://github.com/strukturag/libheif/issues/207
 | 
  | libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707http://www.securityfocus.com/bid/99304
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 |  | Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 http://www.securitytracker.com/id/1034221
 https://bugzilla.redhat.com/show_bug.cgi?id=1238322
 https://linux.oracle.com/cve/CVE-2015-3276.html
 https://linux.oracle.com/errata/ELSA-2015-2131.html
 
 | 
  | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 |  | Expand...http://www.openldap.org/its/index.cgi?findid=8703
 | 
  | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
 http://www.openldap.org/its/index.cgi/Incoming?id=8759
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
 https://access.redhat.com/errata/RHBA-2019:3674
 https://bugs.openldap.org/show_bug.cgi?id=9266
 https://bugzilla.redhat.com/show_bug.cgi?id=1740070
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmariadb3 | CVE-2021-46667 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667https://jira.mariadb.org/browse/MDEV-26350
 https://security.netapp.com/advisory/ntap-20220221-0002/
 
 | 
  | libmariadb3 | CVE-2021-46669 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669https://jira.mariadb.org/browse/MDEV-25638
 https://security.netapp.com/advisory/ntap-20220221-0002/
 
 | 
  | libmariadb3 | CVE-2022-24048 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-363/
 
 | 
  | libmariadb3 | CVE-2022-24050 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-364/
 
 | 
  | libmariadb3 | CVE-2022-24051 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-318/
 
 | 
  | libmariadb3 | CVE-2022-24052 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-367/
 
 | 
  | libmariadb3 | CVE-2021-35604 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
 https://security.netapp.com/advisory/ntap-20211022-0003/
 https://ubuntu.com/security/notices/USN-5123-1
 https://ubuntu.com/security/notices/USN-5123-2
 https://ubuntu.com/security/notices/USN-5170-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libmariadb3 | CVE-2021-46659 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659https://jira.mariadb.org/browse/MDEV-25631
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | libmariadb3 | CVE-2021-46661 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661https://jira.mariadb.org/browse/MDEV-25766
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | libmariadb3 | CVE-2021-46662 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662https://jira.mariadb.org/browse/MDEV-22464
 https://jira.mariadb.org/browse/MDEV-25637
 https://security.netapp.com/advisory/ntap-20220221-0002/
 
 | 
  | libmariadb3 | CVE-2021-46663 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663https://jira.mariadb.org/browse/MDEV-26351
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | libmariadb3 | CVE-2021-46664 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664https://jira.mariadb.org/browse/MDEV-25761
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | libmariadb3 | CVE-2021-46665 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665https://jira.mariadb.org/browse/MDEV-25636
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | libmariadb3 | CVE-2021-46668 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668https://jira.mariadb.org/browse/MDEV-25787
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
 https://github.com/uclouvain/openjpeg/issues/1347
 https://linux.oracle.com/cve/CVE-2021-3575.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://ubuntu.com/security/CVE-2021-3575
 
 | 
  | libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338https://github.com/uclouvain/openjpeg/issues/1338
 https://github.com/uclouvain/openjpeg/pull/1346
 https://github.com/uclouvain/openjpeg/pull/1395
 https://github.com/uclouvain/openjpeg/pull/1396
 https://github.com/uclouvain/openjpeg/pull/1397
 https://github.com/uclouvain/openjpeg/pull/1398
 https://linux.oracle.com/cve/CVE-2021-29338.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
 
 | 
  | libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 |  | Expand...https://github.com/uclouvain/openjpeg/issues/776https://github.com/uclouvain/openjpeg/issues/784
 https://github.com/uclouvain/openjpeg/issues/785
 https://github.com/uclouvain/openjpeg/issues/792
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/100573https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
 https://github.com/uclouvain/openjpeg/issues/731
 https://github.com/uclouvain/openjpeg/issues/732
 https://github.com/uclouvain/openjpeg/issues/777
 https://github.com/uclouvain/openjpeg/issues/778
 https://github.com/uclouvain/openjpeg/issues/779
 https://github.com/uclouvain/openjpeg/issues/780
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93980https://github.com/uclouvain/openjpeg/issues/856
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93979https://github.com/uclouvain/openjpeg/issues/857
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93977https://github.com/uclouvain/openjpeg/issues/858
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93975https://github.com/uclouvain/openjpeg/issues/859
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93783https://github.com/uclouvain/openjpeg/issues/860
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/871
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/872
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479https://github.com/uclouvain/openjpeg/issues/1044
 
 | 
  | libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/105266https://github.com/uclouvain/openjpeg/issues/1126
 
 | 
  | libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/105262https://github.com/uclouvain/openjpeg/issues/1127
 
 | 
  | libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/108921https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
 
 | 
  | libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/106785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
 https://github.com/uclouvain/openjpeg/issues/1178
 
 | 
  | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 |  | Expand...https://github.com/glennrp/libpng/issues/269https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
 
 | 
  | libpng16-16 | CVE-2021-4214 | LOW | 1.6.37-3 |  | Expand... | 
  | libpython3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-minimal | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | libpython3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | libpython3.9-minimal | CVE-2021-3737 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | libpython3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | libpython3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | libpython3.9-stdlib | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-stdlib | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | libpython3.9-stdlib | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-stdlib | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | libpython3.9-stdlib | CVE-2021-3737 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | libpython3.9-stdlib | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | libpython3.9-stdlib | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | libsepol1 | CVE-2021-36084 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
 https://linux.oracle.com/cve/CVE-2021-36084.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36085 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
 https://linux.oracle.com/cve/CVE-2021-36085.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36086 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
 https://linux.oracle.com/cve/CVE-2021-36086.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36087 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
 https://linux.oracle.com/cve/CVE-2021-36087.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
 
 | 
  | libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 |  | Expand...https://github.com/guyinatuxedo/sqlite3_record_leakinghttps://security.netapp.com/advisory/ntap-20220303-0001/
 
 | 
  | libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.sqlite.org/forum/forumpost/718c0a8d17
 
 | 
  | libssl-dev | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 |  | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | libssl-dev | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | libssl-dev | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 |  | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | libsystemd0 | CVE-2021-3997 | MEDIUM | 247.3-6 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997https://ubuntu.com/security/notices/USN-5226-1
 https://www.openwall.com/lists/oss-security/2022/01/10/2
 
 | 
  | libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357http://www.openwall.com/lists/oss-security/2013/10/01/9
 https://bugzilla.redhat.com/show_bug.cgi?id=859060
 
 | 
  | libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 |  | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2http://www.openwall.com/lists/oss-security/2021/08/17/3
 http://www.openwall.com/lists/oss-security/2021/09/07/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
 https://linux.oracle.com/cve/CVE-2020-13529.html
 https://linux.oracle.com/errata/ELSA-2021-4361.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
 https://security.gentoo.org/glsa/202107-48
 https://security.netapp.com/advisory/ntap-20210625-0005/
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
 https://ubuntu.com/security/notices/USN-5013-1
 https://ubuntu.com/security/notices/USN-5013-2
 
 | 
  | libtiff5 | CVE-2022-0561 | MEDIUM | 4.2.0-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 
 | 
  | libtiff5 | CVE-2022-0562 | MEDIUM | 4.2.0-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 
 | 
  | libtiff5 | CVE-2022-0865 | MEDIUM | 4.2.0-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
 https://gitlab.com/libtiff/libtiff/-/issues/385
 https://gitlab.com/libtiff/libtiff/-/merge_requests/306
 
 | 
  | libtiff5 | CVE-2022-22844 | MEDIUM | 4.2.0-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844https://gitlab.com/libtiff/libtiff/-/issues/355
 https://gitlab.com/libtiff/libtiff/-/merge_requests/287
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 
 | 
  | libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
 http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
 http://openwall.com/lists/oss-security/2015/01/24/15
 http://rhn.redhat.com/errata/RHSA-2016-1546.html
 http://rhn.redhat.com/errata/RHSA-2016-1547.html
 http://support.apple.com/kb/HT204941
 http://support.apple.com/kb/HT204942
 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
 http://www.securityfocus.com/bid/72353
 http://www.securitytracker.com/id/1032760
 https://bugzilla.redhat.com/show_bug.cgi?id=1185817
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
 https://linux.oracle.com/cve/CVE-2014-8130.html
 https://linux.oracle.com/errata/ELSA-2016-1547.html
 https://security.gentoo.org/glsa/201701-16
 https://ubuntu.com/security/notices/USN-2553-1
 
 | 
  | libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
 http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
 http://seclists.org/fulldisclosure/2018/Dec/32
 http://seclists.org/fulldisclosure/2018/Dec/47
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101696
 
 | 
  | libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769http://www.securityfocus.com/bid/102331
 https://bugzilla.novell.com/show_bug.cgi?id=1074318
 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
 
 | 
  | libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664http://www.securityfocus.com/bid/95705
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
 https://security.gentoo.org/glsa/201709-27
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690http://www.securityfocus.com/bid/98581
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libudev1 | CVE-2021-3997 | MEDIUM | 247.3-6 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997https://ubuntu.com/security/notices/USN-5226-1
 https://www.openwall.com/lists/oss-security/2022/01/10/2
 
 | 
  | libudev1 | CVE-2013-4392 | LOW | 247.3-6 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357http://www.openwall.com/lists/oss-security/2013/10/01/9
 https://bugzilla.redhat.com/show_bug.cgi?id=859060
 
 | 
  | libudev1 | CVE-2020-13529 | LOW | 247.3-6 |  | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2http://www.openwall.com/lists/oss-security/2021/08/17/3
 http://www.openwall.com/lists/oss-security/2021/09/07/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
 https://linux.oracle.com/cve/CVE-2020-13529.html
 https://linux.oracle.com/errata/ELSA-2021-4361.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
 https://security.gentoo.org/glsa/202107-48
 https://security.netapp.com/advisory/ntap-20210625-0005/
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
 https://ubuntu.com/security/notices/USN-5013-1
 https://ubuntu.com/security/notices/USN-5013-2
 
 | 
  | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libxml2 | CVE-2022-23308 | HIGH | 2.9.10+dfsg-6.7 |  | Expand...https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340ehttps://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
 
 | 
  | linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.92-1 |  | Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
 https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
 
 | 
  | linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
 https://security.netapp.com/advisory/ntap-20200103-0001/
 
 | 
  | linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
 https://security.netapp.com/advisory/ntap-20200103-0001/
 https://ubuntu.com/security/notices/USN-5120-1
 https://ubuntu.com/security/notices/USN-5136-1
 https://ubuntu.com/security/notices/USN-5137-1
 https://ubuntu.com/security/notices/USN-5137-2
 
 | 
  | linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
 https://security.netapp.com/advisory/ntap-20200103-0001/
 
 | 
  | linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.92-1 |  | Expand...https://linux.oracle.com/cve/CVE-2020-12362.htmlhttps://linux.oracle.com/errata/ELSA-2021-9434.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 
 | 
  | linux-libc-dev | CVE-2020-36516 | HIGH | 5.10.92-1 |  | Expand...https://dl.acm.org/doi/10.1145/3372297.3417884
 | 
  | linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
 https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
 https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
 https://www.openwall.com/lists/oss-security/2021/10/20/2
 
 | 
  | linux-libc-dev | CVE-2022-0001 | HIGH | 5.10.92-1 |  | Expand...https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
 https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://ubuntu.com/security/notices/USN-5319-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
 https://www.vusec.net/projects/bhi-spectre-bhb/
 
 | 
  | linux-libc-dev | CVE-2022-0002 | HIGH | 5.10.92-1 |  | Expand...https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
 https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://ubuntu.com/security/notices/USN-5319-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
 https://www.vusec.net/projects/bhi-spectre-bhb/
 
 | 
  | linux-libc-dev | CVE-2022-0330 | HIGH | 5.10.92-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
 https://linux.oracle.com/cve/CVE-2022-0330.html
 https://linux.oracle.com/errata/ELSA-2022-0620.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5295-1
 https://ubuntu.com/security/notices/USN-5295-2
 https://ubuntu.com/security/notices/USN-5297-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://www.openwall.com/lists/oss-security/2022/01/25/12
 
 | 
  | linux-libc-dev | CVE-2022-0435 | HIGH | 5.10.92-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435https://ubuntu.com/security/notices/USN-5302-1
 https://www.openwall.com/lists/oss-security/2022/02/10/1
 
 | 
  | linux-libc-dev | CVE-2022-0492 | HIGH | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051505https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
 https://linux.oracle.com/cve/CVE-2022-0492.html
 https://linux.oracle.com/errata/ELSA-2022-9180.html
 https://ubuntu.com/security/notices/USN-5302-1
 https://www.openwall.com/lists/oss-security/2022/02/04/1
 
 | 
  | linux-libc-dev | CVE-2022-0500 | HIGH | 5.10.92-1 |  | Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
 
 | 
  | linux-libc-dev | CVE-2022-0516 | HIGH | 5.10.92-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55
 https://www.openwall.com/lists/oss-security/2022/02/11/2
 
 | 
  | linux-libc-dev | CVE-2022-0847 | HIGH | 5.10.92-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847https://dirtypipe.cm4all.com/
 https://ubuntu.com/security/notices/USN-5317-1
 https://www.openwall.com/lists/oss-security/2022/03/07/1
 
 | 
  | linux-libc-dev | CVE-2022-22942 | HIGH | 5.10.92-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942https://linux.oracle.com/cve/CVE-2022-22942.html
 https://linux.oracle.com/errata/ELSA-2022-0620.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5295-1
 https://ubuntu.com/security/notices/USN-5295-2
 https://ubuntu.com/security/notices/USN-5297-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://www.openwall.com/lists/oss-security/2022/01/27/4
 
 | 
  | linux-libc-dev | CVE-2022-23960 | HIGH | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960https://developer.arm.com/documentation/ka004995/latest/
 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
 https://www.vusec.net/projects/bhi-spectre-bhb/
 
 | 
  | linux-libc-dev | CVE-2022-24958 | HIGH | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
 https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
 https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
 https://security.netapp.com/advisory/ntap-20220225-0008/
 
 | 
  | linux-libc-dev | CVE-2022-25636 | HIGH | 5.10.92-1 |  | Expand...http://www.openwall.com/lists/oss-security/2022/02/22/1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
 https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6
 https://linux.oracle.com/cve/CVE-2022-25636.html
 https://linux.oracle.com/errata/ELSA-2022-9182.html
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://www.openwall.com/lists/oss-security/2022/02/21/2
 
 | 
  | linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlhttp://www.openwall.com/lists/oss-security/2019/08/20/2
 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
 https://linux.oracle.com/cve/CVE-2019-15213.html
 https://linux.oracle.com/errata/ELSA-2019-4872.html
 https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
 https://security.netapp.com/advisory/ntap-20190905-0002/
 https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
 
 | 
  | linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794https://git.launchpad.net/ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
 https://git.launchpad.net/ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
 https://ubuntu.com/security/notices/USN-4208-1
 https://ubuntu.com/security/notices/USN-4209-1
 https://usn.ubuntu.com/usn/usn-4208-1
 https://usn.ubuntu.com/usn/usn-4209-1
 
 | 
  | linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089https://linux.oracle.com/cve/CVE-2019-16089.html
 https://linux.oracle.com/errata/ELSA-2020-5913.html
 https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
 https://lore.kernel.org/patchwork/patch/1106884/
 https://lore.kernel.org/patchwork/patch/1126650/
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://support.f5.com/csp/article/K03814795?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/notices/USN-4414-1
 https://ubuntu.com/security/notices/USN-4425-1
 https://ubuntu.com/security/notices/USN-4439-1
 https://ubuntu.com/security/notices/USN-4440-1
 https://usn.ubuntu.com/4414-1/
 https://usn.ubuntu.com/4425-1/
 https://usn.ubuntu.com/4439-1/
 https://usn.ubuntu.com/4440-1/
 
 | 
  | linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.92-1 |  | Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1https://github.com/sargun/fuse-example
 https://security.netapp.com/advisory/ntap-20200608-0001/
 https://sourceforge.net/p/fuse/mailman/message/36598753/
 
 | 
  | linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363https://linux.oracle.com/cve/CVE-2020-12363.html
 https://linux.oracle.com/errata/ELSA-2021-2314.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 
 | 
  | linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364https://linux.oracle.com/cve/CVE-2020-12364.html
 https://linux.oracle.com/errata/ELSA-2021-2314.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 
 | 
  | linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.92-1 |  | Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
 https://linux.oracle.com/cve/CVE-2020-14304.html
 https://linux.oracle.com/errata/ELSA-2021-9410.html
 https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
 
 | 
  | linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.92-1 |  | Expand...https://arxiv.org/abs/2009.11776https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
 https://hexhive.epfl.ch/BLURtooth/
 https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
 https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
 https://www.kb.cert.org/vuls/id/589825
 https://www.kb.cert.org/vuls/id/589825/
 
 | 
  | linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504https://linux.oracle.com/cve/CVE-2020-24504.html
 https://linux.oracle.com/errata/ELSA-2021-4356.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
 
 | 
  | linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.92-1 |  | Expand...https://kb.cert.org/vuls/id/799380https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
 
 | 
  | linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
 https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
 https://linux.oracle.com/cve/CVE-2020-36310.html
 https://linux.oracle.com/errata/ELSA-2021-9307.html
 
 | 
  | linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
 
 | 
  | linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
 https://ubuntu.com/security/notices/USN-5115-1
 https://ubuntu.com/security/notices/USN-5117-1
 https://ubuntu.com/security/notices/USN-5120-1
 https://ubuntu.com/security/notices/USN-5135-1
 https://ubuntu.com/security/notices/USN-5136-1
 https://ubuntu.com/security/notices/USN-5137-1
 https://ubuntu.com/security/notices/USN-5137-2
 
 | 
  | linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.92-1 |  | Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
 | 
  | linux-libc-dev | CVE-2021-4023 | MEDIUM | 5.10.92-1 |  | Expand... | 
  | linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.92-1 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-4037https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
 
 | 
  | linux-libc-dev | CVE-2021-4149 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
 https://lkml.org/lkml/2021/10/18/885
 https://lkml.org/lkml/2021/9/13/2565
 
 | 
  | linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2035652https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
 https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
 https://ubuntu.com/security/notices/USN-5278-1
 
 | 
  | linux-libc-dev | CVE-2021-4204 | MEDIUM | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
 https://ubuntu.com/security/notices/USN-5217-1
 https://ubuntu.com/security/notices/USN-5218-1
 https://ubuntu.com/security/notices/USN-5219-1
 https://www.openwall.com/lists/oss-security/2022/01/11/4
 
 | 
  | linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.92-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
 https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
 https://security.netapp.com/advisory/ntap-20211210-0001/
 https://ubuntu.com/security/notices/USN-5302-1
 
 | 
  | linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.10.92-1 |  | Expand...https://bugzilla.kernel.org/show_bug.cgi?id=215231https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
 https://lkml.org/lkml/2022/1/24/4067
 https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
 https://ubuntu.com/security/notices/USN-5302-1
 https://www.openwall.com/lists/oss-security/2022/02/12/1
 
 | 
  | linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2040604https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
 https://bugzilla.redhat.com/show_bug.cgi?id=2044575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
 
 | 
  | linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2049700https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
 https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
 https://github.com/kata-containers/kata-containers/issues/3373
 https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
 
 | 
  | linux-libc-dev | CVE-2022-0617 | MEDIUM | 5.10.92-1 |  | Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eeehttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
 https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
 
 | 
  | linux-libc-dev | CVE-2022-0812 | MEDIUM | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2058361https://twitter.com/iMilnb/status/1497125078252806161
 
 | 
  | linux-libc-dev | CVE-2022-24959 | MEDIUM | 5.10.92-1 | 5.10.92-2 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
 https://git.kernel.org/linus/29eb31542787e1019208a2e1047bb7c76c069536 (5.17-rc2)
 https://github.com/torvalds/linux/commit/29eb31542787e1019208a2e1047bb7c76c069536
 https://ubuntu.com/security/notices/USN-5302-1
 
 | 
  | linux-libc-dev | CVE-2022-25258 | MEDIUM | 5.10.92-1 | 5.10.92-2 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10https://github.com/szymonh/d-os-descriptor
 https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
 
 | 
  | linux-libc-dev | CVE-2022-25375 | MEDIUM | 5.10.92-1 | 5.10.92-2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
 https://github.com/szymonh/rndis-co
 https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
 
 | 
  | linux-libc-dev | CVE-2004-0230 | LOW | 5.10.92-1 |  | Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.ascftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
 ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
 http://kb.juniper.net/JSA10638
 http://marc.info/?l=bugtraq&m=108302060014745&w=2
 http://marc.info/?l=bugtraq&m=108506952116653&w=2
 http://secunia.com/advisories/11440
 http://secunia.com/advisories/11458
 http://secunia.com/advisories/22341
 http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
 http://www.kb.cert.org/vuls/id/415294
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
 http://www.osvdb.org/4030
 http://www.securityfocus.com/archive/1/449179/100/0/threaded
 http://www.securityfocus.com/bid/10183
 http://www.uniras.gov.uk/vuls/2004/236929/index.htm
 http://www.us-cert.gov/cas/techalerts/TA04-111A.html
 http://www.vupen.com/english/advisories/2006/3983
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
 https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
 https://kc.mcafee.com/corporate/index?page=content&id=SB10053
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
 
 | 
  | linux-libc-dev | CVE-2005-3660 | LOW | 5.10.92-1 |  | Expand...http://secunia.com/advisories/18205http://securityreason.com/securityalert/291
 http://securitytracker.com/id?1015402
 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
 http://www.securityfocus.com/bid/16041
 http://www.vupen.com/english/advisories/2005/3076
 https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
 
 | 
  | linux-libc-dev | CVE-2007-3719 | LOW | 5.10.92-1 |  | Expand...http://osvdb.org/37127http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
 
 | 
  | linux-libc-dev | CVE-2008-2544 | LOW | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
 | 
  | linux-libc-dev | CVE-2008-4609 | LOW | 5.10.92-1 |  | Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.htmlhttp://insecure.org/stf/tcp-dos-attack-explained.html
 http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
 http://marc.info/?l=bugtraq&m=125856010926699&w=2
 http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
 http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
 http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
 http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
 http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
 http://www.outpost24.com/news/news-2008-10-02.html
 http://www.us-cert.gov/cas/techalerts/TA09-251A.html
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
 https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
 
 | 
  | linux-libc-dev | CVE-2010-4563 | LOW | 5.10.92-1 |  | Expand...http://seclists.org/dailydave/2011/q2/25http://seclists.org/fulldisclosure/2011/Apr/254
 
 | 
  | linux-libc-dev | CVE-2010-5321 | LOW | 5.10.92-1 |  | Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29http://www.openwall.com/lists/oss-security/2015/02/08/4
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
 https://bugzilla.kernel.org/show_bug.cgi?id=120571
 https://bugzilla.redhat.com/show_bug.cgi?id=620629
 
 | 
  | linux-libc-dev | CVE-2011-4915 | LOW | 5.10.92-1 |  | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
 http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
 http://www.openwall.com/lists/oss-security/2011/11/07/9
 https://lkml.org/lkml/2011/11/7/340
 https://seclists.org/oss-sec/2011/q4/571
 https://security-tracker.debian.org/tracker/CVE-2011-4915
 https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
 
 | 
  | linux-libc-dev | CVE-2011-4917 | LOW | 5.10.92-1 |  | Expand... | 
  | linux-libc-dev | CVE-2012-4542 | LOW | 5.10.92-1 |  | Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2http://marc.info/?l=linux-kernel&m=135904012416042&w=2
 http://rhn.redhat.com/errata/RHSA-2013-0496.html
 http://rhn.redhat.com/errata/RHSA-2013-0579.html
 http://rhn.redhat.com/errata/RHSA-2013-0882.html
 http://rhn.redhat.com/errata/RHSA-2013-0928.html
 https://bugzilla.redhat.com/show_bug.cgi?id=875360
 https://linux.oracle.com/cve/CVE-2012-4542.html
 https://linux.oracle.com/errata/ELSA-2013-2534.html
 https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
 
 | 
  | linux-libc-dev | CVE-2014-9892 | LOW | 5.10.92-1 |  | Expand...http://source.android.com/security/bulletin/2016-08-01.htmlhttp://www.securityfocus.com/bid/92222
 https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
 
 | 
  | linux-libc-dev | CVE-2014-9900 | LOW | 5.10.92-1 |  | Expand...http://source.android.com/security/bulletin/2016-08-01.htmlhttp://www.securityfocus.com/bid/92222
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
 https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
 https://ubuntu.com/security/notices/USN-3358-1
 https://ubuntu.com/security/notices/USN-3359-1
 https://ubuntu.com/security/notices/USN-3360-1
 https://ubuntu.com/security/notices/USN-3360-2
 https://ubuntu.com/security/notices/USN-3364-1
 https://ubuntu.com/security/notices/USN-3364-2
 https://ubuntu.com/security/notices/USN-3364-3
 https://ubuntu.com/security/notices/USN-3371-1
 
 | 
  | linux-libc-dev | CVE-2015-2877 | LOW | 5.10.92-1 |  | Expand...http://www.antoniobarresi.com/files/cain_advisory.txthttp://www.kb.cert.org/vuls/id/935424
 http://www.securityfocus.com/bid/76256
 https://bugzilla.redhat.com/show_bug.cgi?id=1252096
 https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
 https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
 https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
 
 | 
  | linux-libc-dev | CVE-2016-10723 | LOW | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
 https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
 https://patchwork.kernel.org/patch/10395909/
 https://patchwork.kernel.org/patch/9842889/
 https://www.spinics.net/lists/linux-mm/msg117896.html
 
 | 
  | linux-libc-dev | CVE-2016-8660 | LOW | 5.10.92-1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8http://www.securityfocus.com/bid/93558
 https://bugzilla.redhat.com/show_bug.cgi?id=1384851
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
 https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
 https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
 https://marc.info/?l=linux-xfs&m=149498118228320&w=2
 
 | 
  | linux-libc-dev | CVE-2017-0630 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/98213https://source.android.com/security/bulletin/2017-05-01
 https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
 
 | 
  | linux-libc-dev | CVE-2017-13693 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/100502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
 https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
 https://patchwork.kernel.org/patch/9919053/
 
 | 
  | linux-libc-dev | CVE-2017-13694 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/100500https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
 https://patchwork.kernel.org/patch/9806085/
 
 | 
  | linux-libc-dev | CVE-2018-1121 | LOW | 5.10.92-1 |  | Expand...http://seclists.org/oss-sec/2018/q2/122http://www.securityfocus.com/bid/104214
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
 https://www.exploit-db.com/exploits/44806/
 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
 
 | 
  | linux-libc-dev | CVE-2018-12928 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/104593https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
 https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
 https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
 https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
 
 | 
  | linux-libc-dev | CVE-2018-17977 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/105539https://bugzilla.suse.com/show_bug.cgi?id=1111609
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
 https://www.openwall.com/lists/oss-security/2018/10/05/5
 
 | 
  | linux-libc-dev | CVE-2019-11191 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://www.openwall.com/lists/oss-security/2019/04/18/5
 http://www.openwall.com/lists/oss-security/2019/05/22/7
 http://www.securityfocus.com/bid/107887
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
 https://ubuntu.com/security/notices/USN-4006-1
 https://ubuntu.com/security/notices/USN-4006-2
 https://ubuntu.com/security/notices/USN-4007-1
 https://ubuntu.com/security/notices/USN-4007-2
 https://ubuntu.com/security/notices/USN-4008-1
 https://ubuntu.com/security/notices/USN-4008-3
 https://usn.ubuntu.com/4006-1/
 https://usn.ubuntu.com/4006-2/
 https://usn.ubuntu.com/4007-1/
 https://usn.ubuntu.com/4007-2/
 https://usn.ubuntu.com/4008-1/
 https://usn.ubuntu.com/4008-3/
 https://www.openwall.com/lists/oss-security/2019/04/03/4
 https://www.openwall.com/lists/oss-security/2019/04/03/4/1
 
 | 
  | linux-libc-dev | CVE-2019-12378 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/108475https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
 https://linux.oracle.com/cve/CVE-2019-12378.html
 https://linux.oracle.com/errata/ELSA-2019-4746.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://lkml.org/lkml/2019/5/25/229
 
 | 
  | linux-libc-dev | CVE-2019-12379 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/108478https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://security.netapp.com/advisory/ntap-20190710-0002/
 
 | 
  | linux-libc-dev | CVE-2019-12380 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
 http://www.securityfocus.com/bid/108477
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
 https://linux.oracle.com/cve/CVE-2019-12380.html
 https://linux.oracle.com/errata/ELSA-2020-5913.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://security.netapp.com/advisory/ntap-20190710-0002/
 https://ubuntu.com/security/notices/USN-4414-1
 https://ubuntu.com/security/notices/USN-4427-1
 https://ubuntu.com/security/notices/USN-4439-1
 https://usn.ubuntu.com/4414-1/
 https://usn.ubuntu.com/4427-1/
 https://usn.ubuntu.com/4439-1/
 
 | 
  | linux-libc-dev | CVE-2019-12381 | LOW | 5.10.92-1 |  | Expand...http://www.securityfocus.com/bid/108473https://bugzilla.redhat.com/show_bug.cgi?id=1715501
 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
 https://linux.oracle.com/cve/CVE-2019-12381.html
 https://linux.oracle.com/errata/ELSA-2019-4746.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://lkml.org/lkml/2019/5/25/230
 
 | 
  | linux-libc-dev | CVE-2019-12382 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
 http://www.securityfocus.com/bid/108474
 https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
 https://linux.oracle.com/cve/CVE-2019-12382.html
 https://linux.oracle.com/errata/ELSA-2020-1016.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://lkml.org/lkml/2019/5/24/843
 https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
 https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
 
 | 
  | linux-libc-dev | CVE-2019-12455 | LOW | 5.10.92-1 |  | Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://security.netapp.com/advisory/ntap-20190710-0002/
 https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
 
 | 
  | linux-libc-dev | CVE-2019-12456 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
 https://bugzilla.redhat.com/show_bug.cgi?id=1717182
 https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
 https://lkml.org/lkml/2019/5/29/1164
 https://support.f5.com/csp/article/K84310302
 https://support.f5.com/csp/article/K84310302?utm_source=f5support&utm_medium=RSS
 
 | 
  | linux-libc-dev | CVE-2019-16229 | LOW | 5.10.92-1 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4284-1
 https://ubuntu.com/security/notices/USN-4285-1
 https://ubuntu.com/security/notices/USN-4287-1
 https://ubuntu.com/security/notices/USN-4287-2
 https://usn.ubuntu.com/4284-1/
 https://usn.ubuntu.com/4285-1/
 https://usn.ubuntu.com/4287-1/
 https://usn.ubuntu.com/4287-2/
 
 | 
  | linux-libc-dev | CVE-2019-16230 | LOW | 5.10.92-1 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 
 | 
  | linux-libc-dev | CVE-2019-16231 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
 https://linux.oracle.com/cve/CVE-2019-16231.html
 https://linux.oracle.com/errata/ELSA-2020-5533.html
 https://lkml.org/lkml/2019/9/9/487
 https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4225-1
 https://ubuntu.com/security/notices/USN-4225-2
 https://ubuntu.com/security/notices/USN-4226-1
 https://ubuntu.com/security/notices/USN-4227-1
 https://ubuntu.com/security/notices/USN-4227-2
 https://ubuntu.com/security/notices/USN-4904-1
 https://usn.ubuntu.com/4225-1/
 https://usn.ubuntu.com/4225-2/
 https://usn.ubuntu.com/4226-1/
 https://usn.ubuntu.com/4227-1/
 https://usn.ubuntu.com/4227-2/
 
 | 
  | linux-libc-dev | CVE-2019-16232 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
 https://linux.oracle.com/cve/CVE-2019-16232.html
 https://linux.oracle.com/errata/ELSA-2020-5804.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4284-1
 https://ubuntu.com/security/notices/USN-4285-1
 https://ubuntu.com/security/notices/USN-4287-1
 https://ubuntu.com/security/notices/USN-4287-2
 https://ubuntu.com/security/notices/USN-4904-1
 https://usn.ubuntu.com/4284-1/
 https://usn.ubuntu.com/4285-1/
 https://usn.ubuntu.com/4287-1/
 https://usn.ubuntu.com/4287-2/
 
 | 
  | linux-libc-dev | CVE-2019-16233 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
 https://linux.oracle.com/cve/CVE-2019-16233.html
 https://linux.oracle.com/errata/ELSA-2020-5508.html
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4226-1
 https://ubuntu.com/security/notices/USN-4227-1
 https://ubuntu.com/security/notices/USN-4227-2
 https://ubuntu.com/security/notices/USN-4346-1
 https://usn.ubuntu.com/4226-1/
 https://usn.ubuntu.com/4227-1/
 https://usn.ubuntu.com/4227-2/
 https://usn.ubuntu.com/4346-1/
 
 | 
  | linux-libc-dev | CVE-2019-16234 | LOW | 5.10.92-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
 https://linux.oracle.com/cve/CVE-2019-16234.html
 https://linux.oracle.com/errata/ELSA-2020-5804.html
 https://lkml.org/lkml/2019/9/9/487
 https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4342-1
 https://ubuntu.com/security/notices/USN-4344-1
 https://ubuntu.com/security/notices/USN-4345-1
 https://ubuntu.com/security/notices/USN-4346-1
 https://usn.ubuntu.com/4342-1/
 https://usn.ubuntu.com/4344-1/
 https://usn.ubuntu.com/4345-1/
 https://usn.ubuntu.com/4346-1/
 
 | 
  | linux-libc-dev | CVE-2019-19070 | LOW | 5.10.92-1 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
 
 | 
  | linux-libc-dev | CVE-2020-11725 | LOW | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
 https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
 https://twitter.com/yabbadabbadrew/status/1248632267028582400
 
 | 
  | linux-libc-dev | CVE-2020-35501 | LOW | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
 https://www.openwall.com/lists/oss-security/2021/02/18/1
 
 | 
  | linux-libc-dev | CVE-2021-26934 | LOW | 5.10.92-1 |  | Expand...http://xenbits.xen.org/xsa/advisory-363.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
 https://security.netapp.com/advisory/ntap-20210326-0001/
 https://www.openwall.com/lists/oss-security/2021/02/16/2
 https://xenbits.xen.org/xsa/advisory-363.html
 
 | 
  | linux-libc-dev | CVE-2021-32078 | LOW | 5.10.92-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
 https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
 https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
 https://kirtikumarar.com/CVE-2021-32078.txt
 https://security.netapp.com/advisory/ntap-20210813-0002/
 
 | 
  | linux-libc-dev | CVE-2022-0487 | LOW | 5.10.92-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044561https://bugzilla.suse.com/show_bug.cgi?id=1194516
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
 https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
 https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/
 
 | 
  | linux-libc-dev | CVE-2022-24448 | LOW | 5.10.92-1 | 5.10.92-2 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
 https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
 https://ubuntu.com/security/notices/USN-5302-1
 https://www.spinics.net/lists/stable/msg531976.html
 
 | 
  | linux-libc-dev | CVE-2022-25265 | LOW | 5.10.92-1 |  | Expand...https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294https://github.com/x0reaxeax/exec-prot-bypass
 
 | 
  | linux-libc-dev | CVE-2021-39686 | UNKNOWN | 5.10.92-1 |  | Expand... | 
  | linux-libc-dev | CVE-2022-26490 | UNKNOWN | 5.10.92-1 |  | Expand...https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
 | 
  | login | CVE-2007-5686 | LOW | 1:4.8.1-1 |  | Expand...http://secunia.com/advisories/27215http://www.securityfocus.com/archive/1/482129/100/100/threaded
 http://www.securityfocus.com/archive/1/482857/100/0/threaded
 http://www.securityfocus.com/bid/26048
 http://www.vupen.com/english/advisories/2007/3474
 https://issues.rpath.com/browse/RPL-1825
 
 | 
  | login | CVE-2013-4235 | LOW | 1:4.8.1-1 |  | Expand...https://access.redhat.com/security/cve/cve-2013-4235https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security-tracker.debian.org/tracker/CVE-2013-4235
 
 | 
  | login | CVE-2019-19882 | LOW | 1:4.8.1-1 |  | Expand...https://bugs.archlinux.org/task/64836https://bugs.gentoo.org/702252
 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
 https://github.com/shadow-maint/shadow/pull/199
 https://github.com/void-linux/void-packages/pull/17580
 https://security.gentoo.org/glsa/202008-09
 
 | 
  | mariadb-common | CVE-2021-46667 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667https://jira.mariadb.org/browse/MDEV-26350
 https://security.netapp.com/advisory/ntap-20220221-0002/
 
 | 
  | mariadb-common | CVE-2021-46669 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669https://jira.mariadb.org/browse/MDEV-25638
 https://security.netapp.com/advisory/ntap-20220221-0002/
 
 | 
  | mariadb-common | CVE-2022-24048 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-363/
 
 | 
  | mariadb-common | CVE-2022-24050 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-364/
 
 | 
  | mariadb-common | CVE-2022-24051 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-318/
 
 | 
  | mariadb-common | CVE-2022-24052 | HIGH | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052https://mariadb.com/kb/en/security/
 https://ubuntu.com/security/notices/USN-5305-1
 https://www.zerodayinitiative.com/advisories/ZDI-22-367/
 
 | 
  | mariadb-common | CVE-2021-35604 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
 https://security.netapp.com/advisory/ntap-20211022-0003/
 https://ubuntu.com/security/notices/USN-5123-1
 https://ubuntu.com/security/notices/USN-5123-2
 https://ubuntu.com/security/notices/USN-5170-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | mariadb-common | CVE-2021-46659 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659https://jira.mariadb.org/browse/MDEV-25631
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | mariadb-common | CVE-2021-46661 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661https://jira.mariadb.org/browse/MDEV-25766
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662https://jira.mariadb.org/browse/MDEV-22464
 https://jira.mariadb.org/browse/MDEV-25637
 https://security.netapp.com/advisory/ntap-20220221-0002/
 
 | 
  | mariadb-common | CVE-2021-46663 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663https://jira.mariadb.org/browse/MDEV-26351
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | mariadb-common | CVE-2021-46664 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664https://jira.mariadb.org/browse/MDEV-25761
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | mariadb-common | CVE-2021-46665 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665https://jira.mariadb.org/browse/MDEV-25636
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | mariadb-common | CVE-2021-46668 | MEDIUM | 1:10.5.12-0+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668https://jira.mariadb.org/browse/MDEV-25787
 https://security.netapp.com/advisory/ntap-20220221-0002/
 https://ubuntu.com/security/notices/USN-5305-1
 
 | 
  | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | openssh-client | CVE-2021-41617 | HIGH | 1:8.4p1-5 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
 https://linux.oracle.com/cve/CVE-2021-41617.html
 https://linux.oracle.com/errata/ELSA-2021-9575.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
 https://security.netapp.com/advisory/ntap-20211014-0004/
 https://www.openssh.com/security.html
 https://www.openssh.com/txt/release-8.8
 https://www.openwall.com/lists/oss-security/2021/09/26/1
 
 | 
  | openssh-client | CVE-2007-2243 | LOW | 1:8.4p1-5 |  | Expand...http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.htmlhttp://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html
 http://securityreason.com/securityalert/2631
 http://www.osvdb.org/34600
 http://www.securityfocus.com/bid/23601
 https://exchange.xforce.ibmcloud.com/vulnerabilities/33794
 https://security.netapp.com/advisory/ntap-20191107-0003/
 
 | 
  | openssh-client | CVE-2007-2768 | LOW | 1:8.4p1-5 |  | Expand...http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.htmlhttp://www.osvdb.org/34601
 https://security.netapp.com/advisory/ntap-20191107-0002/
 
 | 
  | openssh-client | CVE-2008-3234 | LOW | 1:8.4p1-5 |  | Expand...http://www.securityfocus.com/bid/30276https://exchange.xforce.ibmcloud.com/vulnerabilities/44037
 https://www.exploit-db.com/exploits/6094
 
 | 
  | openssh-client | CVE-2016-20012 | LOW | 1:8.4p1-5 |  | Expand...https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265https://github.com/openssh/openssh-portable/pull/270
 https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
 https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
 https://rushter.com/blog/public-ssh-keys/
 https://security.netapp.com/advisory/ntap-20211014-0005/
 https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
 https://www.openwall.com/lists/oss-security/2018/08/24/1
 
 | 
  | openssh-client | CVE-2018-15919 | LOW | 1:8.4p1-5 |  | Expand...http://seclists.org/oss-sec/2018/q3/180http://www.securityfocus.com/bid/105163
 https://security.netapp.com/advisory/ntap-20181221-0001/
 
 | 
  | openssh-client | CVE-2019-6110 | LOW | 1:8.4p1-5 |  | Expand...https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.chttps://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
 https://security.gentoo.org/glsa/201903-16
 https://security.netapp.com/advisory/ntap-20190213-0001/
 https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
 https://www.exploit-db.com/exploits/46193/
 
 | 
  | openssh-client | CVE-2020-14145 | LOW | 1:8.4p1-5 |  | Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
 https://docs.ssh-mitm.at/CVE-2020-14145.html
 https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
 https://linux.oracle.com/cve/CVE-2020-14145.html
 https://linux.oracle.com/errata/ELSA-2021-4368.html
 https://security.gentoo.org/glsa/202105-35
 https://security.netapp.com/advisory/ntap-20200709-0004/
 https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
 https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
 
 | 
  | openssh-client | CVE-2020-15778 | LOW | 1:8.4p1-5 |  | Expand...https://access.redhat.com/articles/5284081https://github.com/cpandya2909/CVE-2020-15778
 https://github.com/cpandya2909/CVE-2020-15778/
 https://news.ycombinator.com/item?id=25005567
 https://security.netapp.com/advisory/ntap-20200731-0007/
 https://www.openssh.com/security.html
 
 | 
  | openssl | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 |  | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 |  | Expand...http://secunia.com/advisories/27215http://www.securityfocus.com/archive/1/482129/100/100/threaded
 http://www.securityfocus.com/archive/1/482857/100/0/threaded
 http://www.securityfocus.com/bid/26048
 http://www.vupen.com/english/advisories/2007/3474
 https://issues.rpath.com/browse/RPL-1825
 
 | 
  | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 |  | Expand...https://access.redhat.com/security/cve/cve-2013-4235https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security-tracker.debian.org/tracker/CVE-2013-4235
 
 | 
  | passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 |  | Expand...https://bugs.archlinux.org/task/64836https://bugs.gentoo.org/702252
 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
 https://github.com/shadow-maint/shadow/pull/199
 https://github.com/void-linux/void-packages/pull/17580
 https://security.gentoo.org/glsa/202008-09
 
 | 
  | perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | python3.9 | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9 | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | python3.9 | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9 | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | python3.9 | CVE-2021-3737 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | python3.9 | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | python3.9 | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | python3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9-minimal | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | python3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | python3.9-minimal | CVE-2021-3737 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | python3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | python3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 |  | Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 
 | 
  | util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | wget | CVE-2021-31879 | MEDIUM | 1.21-1+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
 https://savannah.gnu.org/bugs/?56909
 https://security.netapp.com/advisory/ntap-20210618-0002/
 
 |