apt | CVE-2011-3374 | LOW | 1.8.2.3 | | Expand...https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374
|
bash | CVE-2019-18276 | LOW | 5.0-4 | | Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://www.youtube.com/watch?v=-wGtxJ8opa8
|
bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
coreutils | CVE-2016-2781 | LOW | 8.30-3 | | Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/
|
coreutils | CVE-2017-18018 | LOW | 8.30-3 | | Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
|
curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html
|
curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22922.html https://hackerone.com/reports/1213175 https://linux.oracle.com/cve/CVE-2021-22922.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://security.netapp.com/advisory/ntap-20210902-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22923.html https://hackerone.com/reports/1213181 https://linux.oracle.com/cve/CVE-2021-22923.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://security.netapp.com/advisory/ntap-20210902-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855 https://dev.gnupg.org/T4755 https://eprint.iacr.org/2020/014.pdf https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html https://rwc.iacr.org/2020/slides/Leurent.pdf https://ubuntu.com/security/notices/USN-4516-1 https://usn.ubuntu.com/4516-1/
|
imagemagick-6-common | CVE-2020-19667 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667 https://github.com/ImageMagick/ImageMagick/issues/1895 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27752 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
|
imagemagick-6-common | CVE-2020-27766 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-29599 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599 https://github.com/ImageMagick/ImageMagick/discussions/2851 https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html https://linux.oracle.com/cve/CVE-2020-29599.html https://linux.oracle.com/errata/ELSA-2021-0024.html https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://security.gentoo.org/glsa/202101-36
|
imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
imagemagick-6-common | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
|
imagemagick-6-common | CVE-2020-25665 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-25674 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-25676 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891934 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27750 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27756 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756 https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27760 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894239 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27762 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894680 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27770 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2021-20176 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1916610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241 https://github.com/ImageMagick/ImageMagick/pull/3177 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
|
imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243 https://github.com/ImageMagick/ImageMagick/pull/3193 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
|
imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244 https://github.com/ImageMagick/ImageMagick/pull/3194 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-5158-1
|
imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245 https://github.com/ImageMagick/ImageMagick/issues/3176 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
|
imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-5158-1
|
imagemagick-6-common | CVE-2021-3596 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596 https://github.com/ImageMagick/ImageMagick/issues/2624
|
imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212 https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
|
imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
|
imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html http://secunia.com/advisories/30879 http://secunia.com/advisories/32151 http://sourceforge.net/forum/forum.php?forum_id=841176 http://sourceforge.net/project/shownotes.php?release_id=610253 http://www.securityfocus.com/bid/30055 http://www.securitytracker.com/id?1020413 http://www.vupen.com/english/advisories/2008/1984/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43511 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
|
imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2 http://www.openwall.com/lists/oss-security/2016/12/08/18 http://www.securityfocus.com/bid/93599 https://bugzilla.redhat.com/show_bug.cgi?id=1385694 https://github.com/ImageMagick/ImageMagick/issues/272
|
imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
|
imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
|
imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.securityfocus.com/bid/97166 https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/ https://github.com/ImageMagick/ImageMagick/issues/271
|
imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.securityfocus.com/bid/105137 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607 https://github.com/ImageMagick/ImageMagick/issues/1255 https://linux.oracle.com/cve/CVE-2018-15607.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4034-1 https://usn.ubuntu.com/4034-1/
|
imagemagick-6-common | CVE-2019-13310 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310 https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d https://github.com/ImageMagick/ImageMagick/issues/1616 https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51 https://linux.oracle.com/cve/CVE-2019-13310.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4192-1 https://usn.ubuntu.com/4192-1/
|
imagemagick-6-common | CVE-2019-16709 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709 https://github.com/ImageMagick/ImageMagick/issues/1531 https://linux.oracle.com/cve/CVE-2019-16709.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4192-1 https://usn.ubuntu.com/4192-1/
|
imagemagick-6-common | CVE-2020-10251 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/1859
|
imagemagick-6-common | CVE-2020-25666 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-25675 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891933 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27560 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560 https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4670-1
|
imagemagick-6-common | CVE-2020-27751 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891994 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27753 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753 https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894231 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894232 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755 https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27757 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27758 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894236 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27759 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27761 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27763 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27764 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5 https://bugzilla.redhat.com/show_bug.cgi?id=1894683 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764 https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27765 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894684 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27767 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894687 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27768 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894689 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27769 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769 https://github.com/ImageMagick/ImageMagick/issues/1740 https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27771 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898290 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27772 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27773 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898295 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27774 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898296 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27775 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2020-27776 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776 https://ubuntu.com/security/notices/USN-4988-1
|
imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
|
libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | | Expand...https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374
|
libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | | Expand...https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751 https://linux.oracle.com/cve/CVE-2020-1751.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200430-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25423 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | | Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998 https://ubuntu.com/security/notices/USN-5310-1 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin | CVE-2010-4756 | LOW | 2.28-10 | | Expand...http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
|
libc-bin | CVE-2016-10228 | LOW | 2.28-10 | | Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin | CVE-2018-20796 | LOW | 2.28-10 | | Expand...http://www.securityfocus.com/bid/107160 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022
|
libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | | Expand...http://www.securityfocus.com/bid/109167 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023
|
libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | | Expand...http://www.securityfocus.com/bid/109162 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024
|
libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025
|
libc-bin | CVE-2019-19126 | LOW | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin | CVE-2019-9192 | LOW | 2.28-10 | | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc-bin | CVE-2020-6096 | LOW | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-bin | CVE-2021-27645 | LOW | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | | Expand...https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 | CVE-2020-1751 | HIGH | 2.28-10 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751 https://linux.oracle.com/cve/CVE-2020-1751.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200430-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25423 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 | CVE-2020-1752 | HIGH | 2.28-10 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 | CVE-2021-3326 | HIGH | 2.28-10 | | Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 | CVE-2021-3999 | HIGH | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998 https://ubuntu.com/security/notices/USN-5310-1 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 | CVE-2010-4756 | LOW | 2.28-10 | | Expand...http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
|
libc6 | CVE-2016-10228 | LOW | 2.28-10 | | Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc6 | CVE-2018-20796 | LOW | 2.28-10 | | Expand...http://www.securityfocus.com/bid/107160 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc6 | CVE-2019-1010022 | LOW | 2.28-10 | | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022
|
libc6 | CVE-2019-1010023 | LOW | 2.28-10 | | Expand...http://www.securityfocus.com/bid/109167 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023
|
libc6 | CVE-2019-1010024 | LOW | 2.28-10 | | Expand...http://www.securityfocus.com/bid/109162 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024
|
libc6 | CVE-2019-1010025 | LOW | 2.28-10 | | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025
|
libc6 | CVE-2019-19126 | LOW | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 | CVE-2019-9192 | LOW | 2.28-10 | | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc6 | CVE-2020-6096 | LOW | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc6 | CVE-2021-27645 | LOW | 2.28-10 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22922.html https://hackerone.com/reports/1213175 https://linux.oracle.com/cve/CVE-2021-22922.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://security.netapp.com/advisory/ntap-20210902-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22923.html https://hackerone.com/reports/1213181 https://linux.oracle.com/cve/CVE-2021-22923.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://security.netapp.com/advisory/ntap-20210902-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | Expand...https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libde265-0 | CVE-2020-21598 | HIGH | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/237
|
libde265-0 | CVE-2021-36409 | HIGH | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/300
|
libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/233
|
libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/239
|
libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/236
|
libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/238
|
libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/235
|
libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/243
|
libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/241
|
libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/242
|
libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/240
|
libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/231
|
libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/234
|
libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/232
|
libde265-0 | CVE-2021-35452 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/298
|
libde265-0 | CVE-2021-36408 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/299
|
libde265-0 | CVE-2021-36410 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/301
|
libde265-0 | CVE-2021-36411 | MEDIUM | 1.0.3-1 | | Expand...https://github.com/strukturag/libde265/issues/302
|
libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u3 | | Expand...http://openwall.com/lists/oss-security/2013/02/22/3 http://seclists.org/fulldisclosure/2021/Oct/61 http://seclists.org/fulldisclosure/2021/Oct/62 http://seclists.org/fulldisclosure/2021/Oct/63 http://seclists.org/fulldisclosure/2021/Sep/33 http://seclists.org/fulldisclosure/2021/Sep/34 http://seclists.org/fulldisclosure/2021/Sep/35 http://seclists.org/fulldisclosure/2021/Sep/38 http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 http://securitytracker.com/id?1028213 http://www.openwall.com/lists/oss-security/2013/04/12/6 http://www.openwall.com/lists/oss-security/2021/10/07/4 http://www.osvdb.org/90634 http://www.securityfocus.com/bid/58233 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E https://security.gentoo.org/glsa/201701-21 https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://support.apple.com/kb/HT212807 https://support.apple.com/kb/HT212814 https://support.apple.com/kb/HT212815 https://support.apple.com/kb/HT212819
|
libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328 https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://eprint.iacr.org/2021/923 https://linux.oracle.com/cve/CVE-2021-33560.html https://linux.oracle.com/errata/ELSA-2021-4409.html https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/ https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html http://www.openwall.com/lists/oss-security/2019/10/02/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627 https://dev.gnupg.org/T4683 https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5 https://linux.oracle.com/cve/CVE-2019-13627.html https://linux.oracle.com/errata/ELSA-2020-4482.html https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html https://minerva.crocs.fi.muni.cz/ https://security-tracker.debian.org/tracker/CVE-2019-13627 https://security.gentoo.org/glsa/202003-32 https://ubuntu.com/security/notices/USN-4236-1 https://ubuntu.com/security/notices/USN-4236-2 https://ubuntu.com/security/notices/USN-4236-3 https://usn.ubuntu.com/4236-1/ https://usn.ubuntu.com/4236-2/ https://usn.ubuntu.com/4236-3/
|
libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | | Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html https://www.oracle.com/security-alerts/cpujan2020.html
|
libglib2.0-0 | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044 http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html http://openwall.com/lists/oss-security/2012/01/10/12 https://bugzilla.redhat.com/show_bug.cgi?id=772720
|
libglib2.0-0 | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | | Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d https://gitlab.gnome.org/GNOME/glib/-/issues/2197 https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
|
libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | | Expand...https://bugs.debian.org/994405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | | Expand... |
libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | | Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/ http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx http://curl.haxx.se/docs/adv_20120124B.html http://downloads.asterisk.org/pub/security/AST-2016-001.html http://ekoparty.org/2011/juliano-rizzo.php http://eprint.iacr.org/2004/111 http://eprint.iacr.org/2006/136 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=132872385320240&w=2 http://marc.info/?l=bugtraq&m=133365109612558&w=2 http://marc.info/?l=bugtraq&m=133728004526190&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue http://osvdb.org/74829 http://rhn.redhat.com/errata/RHSA-2012-0508.html http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/45791 http://secunia.com/advisories/47998 http://secunia.com/advisories/48256 http://secunia.com/advisories/48692 http://secunia.com/advisories/48915 http://secunia.com/advisories/48948 http://secunia.com/advisories/49198 http://secunia.com/advisories/55322 http://secunia.com/advisories/55350 http://secunia.com/advisories/55351 http://security.gentoo.org/glsa/glsa-201203-02.xml http://security.gentoo.org/glsa/glsa-201406-32.xml http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5001 http://support.apple.com/kb/HT5130 http://support.apple.com/kb/HT5281 http://support.apple.com/kb/HT5501 http://support.apple.com/kb/HT6150 http://technet.microsoft.com/security/advisory/2588513 http://vnhacker.blogspot.com/2011/09/beast.html http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf http://www.debian.org/security/2012/dsa-2398 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.imperialviolet.org/2011/09/23/chromeandbeast.html http://www.insecure.cl/Beast-SSL.rar http://www.kb.cert.org/vuls/id/864643 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 http://www.opera.com/docs/changelogs/mac/1151/ http://www.opera.com/docs/changelogs/mac/1160/ http://www.opera.com/docs/changelogs/unix/1151/ http://www.opera.com/docs/changelogs/unix/1160/ http://www.opera.com/docs/changelogs/windows/1151/ http://www.opera.com/docs/changelogs/windows/1160/ http://www.opera.com/support/kb/view/1004/ http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://www.redhat.com/support/errata/RHSA-2011-1384.html http://www.redhat.com/support/errata/RHSA-2012-0006.html http://www.securityfocus.com/bid/49388 http://www.securityfocus.com/bid/49778 http://www.securitytracker.com/id/1029190 http://www.securitytracker.com/id?1025997 http://www.securitytracker.com/id?1026103 http://www.securitytracker.com/id?1026704 http://www.ubuntu.com/usn/USN-1263-1 http://www.us-cert.gov/cas/techalerts/TA12-010A.html https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail https://bugzilla.novell.com/show_bug.cgi?id=719047 https://bugzilla.redhat.com/show_bug.cgi?id=737506 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 https://hermes.opensuse.org/messages/13154861 https://hermes.opensuse.org/messages/13155432 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://linux.oracle.com/cve/CVE-2011-3389.html https://linux.oracle.com/errata/ELSA-2011-1380.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 https://ubuntu.com/security/notices/USN-1263-1
|
libgomp1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
libgomp1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libheif1 | CVE-2020-19498 | HIGH | 1.3.2-2~deb10u1 | | Expand...https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58 https://github.com/strukturag/libheif/issues/139
|
libheif1 | CVE-2020-19499 | HIGH | 1.3.2-2~deb10u1 | | Expand...https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd https://github.com/strukturag/libheif/issues/138
|
libheif1 | CVE-2020-23109 | HIGH | 1.3.2-2~deb10u1 | | Expand...https://github.com/strukturag/libheif/issues/207
|
libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290 https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5 https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de https://gitlab.com/libidn/libidn2/merge_requests/71 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/ https://security.gentoo.org/glsa/202003-63 https://ubuntu.com/security/notices/USN-4168-1 https://usn.ubuntu.com/4168-1/
|
libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjpeg62-turbo | CVE-2017-15232 | LOW | 1:1.5.2-2+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232 https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182 https://github.com/mozilla/mozjpeg/issues/268 https://ubuntu.com/security/notices/USN-3706-1 https://usn.ubuntu.com/3706-1/
|
libjpeg62-turbo | CVE-2018-11813 | LOW | 1:1.5.2-2+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html http://www.ijg.org/files/jpegsrc.v9d.tar.gz https://access.redhat.com/errata/RHSA-2019:2052 https://bugs.gentoo.org/727908 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813 https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c https://linux.oracle.com/cve/CVE-2018-11813.html https://linux.oracle.com/errata/ELSA-2019-2052.html
|
libjpeg62-turbo | CVE-2020-17541 | LOW | 1:1.5.2-2+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html
|
libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securitytracker.com/id/1034221 https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://linux.oracle.com/cve/CVE-2015-3276.html https://linux.oracle.com/errata/ELSA-2015-2131.html
|
libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://www.openldap.org/its/index.cgi?findid=8703
|
libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://www.openldap.org/its/index.cgi/Incoming?id=8759 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html https://access.redhat.com/errata/RHBA-2019:3674 https://bugs.openldap.org/show_bug.cgi?id=9266 https://bugzilla.redhat.com/show_bug.cgi?id=1740070 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securitytracker.com/id/1034221 https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://linux.oracle.com/cve/CVE-2015-3276.html https://linux.oracle.com/errata/ELSA-2015-2131.html
|
libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://www.openldap.org/its/index.cgi?findid=8703
|
libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://www.openldap.org/its/index.cgi/Incoming?id=8759 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html https://access.redhat.com/errata/RHBA-2019:3674 https://bugs.openldap.org/show_bug.cgi?id=9266 https://bugzilla.redhat.com/show_bug.cgi?id=1740070 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941 https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2 https://github.com/lz4/lz4/issues/801 https://github.com/lz4/lz4/pull/756 https://github.com/lz4/lz4/pull/760 https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
libmagickcore-6.q16-6 | CVE-2020-19667 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667 https://github.com/ImageMagick/ImageMagick/issues/1895 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27752 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
|
libmagickcore-6.q16-6 | CVE-2020-27766 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-29599 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599 https://github.com/ImageMagick/ImageMagick/discussions/2851 https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html https://linux.oracle.com/cve/CVE-2020-29599.html https://linux.oracle.com/errata/ELSA-2021-0024.html https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://security.gentoo.org/glsa/202101-36
|
libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickcore-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
|
libmagickcore-6.q16-6 | CVE-2020-25665 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-25674 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-25676 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891934 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27750 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27756 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27760 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894239 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27762 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894680 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27770 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2021-20176 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1916610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241 https://github.com/ImageMagick/ImageMagick/pull/3177 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
|
libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243 https://github.com/ImageMagick/ImageMagick/pull/3193 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
|
libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244 https://github.com/ImageMagick/ImageMagick/pull/3194 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245 https://github.com/ImageMagick/ImageMagick/issues/3176 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
|
libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickcore-6.q16-6 | CVE-2021-3596 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596 https://github.com/ImageMagick/ImageMagick/issues/2624
|
libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212 https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
|
libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
|
libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html http://secunia.com/advisories/30879 http://secunia.com/advisories/32151 http://sourceforge.net/forum/forum.php?forum_id=841176 http://sourceforge.net/project/shownotes.php?release_id=610253 http://www.securityfocus.com/bid/30055 http://www.securitytracker.com/id?1020413 http://www.vupen.com/english/advisories/2008/1984/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43511 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
|
libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2 http://www.openwall.com/lists/oss-security/2016/12/08/18 http://www.securityfocus.com/bid/93599 https://bugzilla.redhat.com/show_bug.cgi?id=1385694 https://github.com/ImageMagick/ImageMagick/issues/272
|
libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
|
libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
|
libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.securityfocus.com/bid/97166 https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/ https://github.com/ImageMagick/ImageMagick/issues/271
|
libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.securityfocus.com/bid/105137 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607 https://github.com/ImageMagick/ImageMagick/issues/1255 https://linux.oracle.com/cve/CVE-2018-15607.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4034-1 https://usn.ubuntu.com/4034-1/
|
libmagickcore-6.q16-6 | CVE-2019-13310 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310 https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d https://github.com/ImageMagick/ImageMagick/issues/1616 https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51 https://linux.oracle.com/cve/CVE-2019-13310.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4192-1 https://usn.ubuntu.com/4192-1/
|
libmagickcore-6.q16-6 | CVE-2019-16709 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709 https://github.com/ImageMagick/ImageMagick/issues/1531 https://linux.oracle.com/cve/CVE-2019-16709.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4192-1 https://usn.ubuntu.com/4192-1/
|
libmagickcore-6.q16-6 | CVE-2020-10251 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/1859
|
libmagickcore-6.q16-6 | CVE-2020-25666 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-25675 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891933 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27560 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560 https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4670-1
|
libmagickcore-6.q16-6 | CVE-2020-27751 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891994 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27753 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894231 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894232 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27757 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27758 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894236 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27759 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27761 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27763 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27764 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5 https://bugzilla.redhat.com/show_bug.cgi?id=1894683 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764 https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27765 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894684 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27767 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894687 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27768 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894689 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27769 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769 https://github.com/ImageMagick/ImageMagick/issues/1740 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27771 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898290 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27772 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27773 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898295 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27774 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898296 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27775 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2020-27776 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
|
libmagickwand-6.q16-6 | CVE-2020-19667 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667 https://github.com/ImageMagick/ImageMagick/issues/1895 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27752 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
|
libmagickwand-6.q16-6 | CVE-2020-27766 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-29599 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599 https://github.com/ImageMagick/ImageMagick/discussions/2851 https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html https://linux.oracle.com/cve/CVE-2020-29599.html https://linux.oracle.com/errata/ELSA-2021-0024.html https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://security.gentoo.org/glsa/202101-36
|
libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickwand-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
|
libmagickwand-6.q16-6 | CVE-2020-25665 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-25674 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-25676 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891934 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27750 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27756 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27760 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894239 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27762 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894680 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27770 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2021-20176 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1916610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241 https://github.com/ImageMagick/ImageMagick/pull/3177 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
|
libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243 https://github.com/ImageMagick/ImageMagick/pull/3193 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
|
libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244 https://github.com/ImageMagick/ImageMagick/pull/3194 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245 https://github.com/ImageMagick/ImageMagick/issues/3176 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
|
libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-5158-1
|
libmagickwand-6.q16-6 | CVE-2021-3596 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596 https://github.com/ImageMagick/ImageMagick/issues/2624
|
libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212 https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
|
libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
|
libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html http://secunia.com/advisories/30879 http://secunia.com/advisories/32151 http://sourceforge.net/forum/forum.php?forum_id=841176 http://sourceforge.net/project/shownotes.php?release_id=610253 http://www.securityfocus.com/bid/30055 http://www.securitytracker.com/id?1020413 http://www.vupen.com/english/advisories/2008/1984/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43511 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
|
libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2 http://www.openwall.com/lists/oss-security/2016/12/08/18 http://www.securityfocus.com/bid/93599 https://bugzilla.redhat.com/show_bug.cgi?id=1385694 https://github.com/ImageMagick/ImageMagick/issues/272
|
libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
|
libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
|
libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.securityfocus.com/bid/97166 https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/ https://github.com/ImageMagick/ImageMagick/issues/271
|
libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://www.securityfocus.com/bid/105137 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607 https://github.com/ImageMagick/ImageMagick/issues/1255 https://linux.oracle.com/cve/CVE-2018-15607.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4034-1 https://usn.ubuntu.com/4034-1/
|
libmagickwand-6.q16-6 | CVE-2019-13310 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310 https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d https://github.com/ImageMagick/ImageMagick/issues/1616 https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51 https://linux.oracle.com/cve/CVE-2019-13310.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4192-1 https://usn.ubuntu.com/4192-1/
|
libmagickwand-6.q16-6 | CVE-2019-16709 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709 https://github.com/ImageMagick/ImageMagick/issues/1531 https://linux.oracle.com/cve/CVE-2019-16709.html https://linux.oracle.com/errata/ELSA-2020-1180.html https://ubuntu.com/security/notices/USN-4192-1 https://usn.ubuntu.com/4192-1/
|
libmagickwand-6.q16-6 | CVE-2020-10251 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://github.com/ImageMagick/ImageMagick/issues/1859
|
libmagickwand-6.q16-6 | CVE-2020-25666 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-25675 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891933 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27560 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560 https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4670-1
|
libmagickwand-6.q16-6 | CVE-2020-27751 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891994 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27753 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894231 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894232 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27757 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27758 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894236 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27759 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27761 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27763 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27764 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5 https://bugzilla.redhat.com/show_bug.cgi?id=1894683 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764 https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27765 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894684 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27767 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894687 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27768 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894689 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27769 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769 https://github.com/ImageMagick/ImageMagick/issues/1740 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27771 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898290 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27772 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27773 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898295 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27774 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898296 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27775 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2020-27776 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776 https://ubuntu.com/security/notices/USN-4988-1
|
libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
|
libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090 https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr https://linux.oracle.com/cve/CVE-2020-11080.html https://linux.oracle.com/errata/ELSA-2020-5765.html https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/ https://www.debian.org/security/2020/dsa-4696 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
libonig5 | CVE-2019-13224 | LOW | 6.9.1-1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224 https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 https://linux.oracle.com/cve/CVE-2019-13224.html https://linux.oracle.com/errata/ELSA-2020-5861.html https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/ https://security.gentoo.org/glsa/201911-03 https://support.f5.com/csp/article/K00103182 https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4088-1 https://usn.ubuntu.com/4088-1/
|
libonig5 | CVE-2019-13225 | LOW | 6.9.1-1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225 https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c https://linux.oracle.com/cve/CVE-2019-13225.html https://linux.oracle.com/errata/ELSA-2020-5861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/ https://security.gentoo.org/glsa/201911-03
|
libonig5 | CVE-2019-16163 | LOW | 6.9.1-1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16163 https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180 https://github.com/kkos/oniguruma/compare/v6.9.2...v6.9.3 https://github.com/kkos/oniguruma/issues/147 https://linux.oracle.com/cve/CVE-2019-16163.html https://linux.oracle.com/errata/ELSA-2020-3662.html https://lists.debian.org/debian-lts-announce/2019/09/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWOWZZNFSAWM3BUTQNAE3PD44A6JU4KE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW47MSFZ6WYOAOFXHBDGU4LYACFRKC2Y/ https://ubuntu.com/security/notices/USN-4460-1 https://usn.ubuntu.com/4460-1/
|
libonig5 | CVE-2019-19012 | LOW | 6.9.1-1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19012 https://github.com/kkos/oniguruma/issues/164 https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2 https://github.com/tarantula-team/CVE-2019-19012 https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/ https://ubuntu.com/security/notices/USN-4460-1 https://usn.ubuntu.com/4460-1/
|
libonig5 | CVE-2019-19203 | LOW | 6.9.1-1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19203 https://github.com/ManhNDd/CVE-2019-19203 https://github.com/kkos/oniguruma/issues/163 https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2 https://github.com/tarantula-team/CVE-2019-19203 https://linux.oracle.com/cve/CVE-2019-19203.html https://linux.oracle.com/errata/ELSA-2020-3662.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
|
libonig5 | CVE-2019-19204 | LOW | 6.9.1-1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204 https://github.com/ManhNDd/CVE-2019-19204 https://github.com/kkos/oniguruma/issues/162 https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2 https://github.com/tarantula-team/CVE-2019-19204 https://linux.oracle.com/cve/CVE-2019-19204.html https://linux.oracle.com/errata/ELSA-2020-3662.html https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/ https://ubuntu.com/security/notices/USN-4460-1 https://usn.ubuntu.com/4460-1/
|
libonig5 | CVE-2019-19246 | LOW | 6.9.1-1 | | Expand...https://bugs.php.net/bug.php?id=78559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19246 https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b https://linux.oracle.com/cve/CVE-2019-19246.html https://linux.oracle.com/errata/ELSA-2020-3662.html https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/ https://ubuntu.com/security/notices/USN-4460-1 https://usn.ubuntu.com/4460-1/
|
libopenjp2-7 | CVE-2021-3575 | HIGH | 2.3.0-2+deb10u2 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575 https://github.com/uclouvain/openjpeg/issues/1347 https://linux.oracle.com/cve/CVE-2021-3575.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://ubuntu.com/security/CVE-2021-3575
|
libopenjp2-7 | CVE-2019-12973 | MEDIUM | 2.3.0-2+deb10u2 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html http://www.securityfocus.com/bid/108900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973 https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3 https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503 https://linux.oracle.com/cve/CVE-2019-12973.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html https://security.gentoo.org/glsa/202101-29 https://www.oracle.com/security-alerts/cpujul2020.html
|
libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.3.0-2+deb10u2 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338 https://github.com/uclouvain/openjpeg/issues/1338 https://github.com/uclouvain/openjpeg/pull/1346 https://github.com/uclouvain/openjpeg/pull/1395 https://github.com/uclouvain/openjpeg/pull/1396 https://github.com/uclouvain/openjpeg/pull/1397 https://github.com/uclouvain/openjpeg/pull/1398 https://linux.oracle.com/cve/CVE-2021-29338.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
|
libopenjp2-7 | CVE-2016-10505 | LOW | 2.3.0-2+deb10u2 | | Expand...https://github.com/uclouvain/openjpeg/issues/776 https://github.com/uclouvain/openjpeg/issues/784 https://github.com/uclouvain/openjpeg/issues/785 https://github.com/uclouvain/openjpeg/issues/792 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-10506 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/100573 https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b https://github.com/uclouvain/openjpeg/issues/731 https://github.com/uclouvain/openjpeg/issues/732 https://github.com/uclouvain/openjpeg/issues/777 https://github.com/uclouvain/openjpeg/issues/778 https://github.com/uclouvain/openjpeg/issues/779 https://github.com/uclouvain/openjpeg/issues/780 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9113 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/93980 https://github.com/uclouvain/openjpeg/issues/856 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9114 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/93979 https://github.com/uclouvain/openjpeg/issues/857 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9115 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/93977 https://github.com/uclouvain/openjpeg/issues/858 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9116 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/93975 https://github.com/uclouvain/openjpeg/issues/859 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9117 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/93783 https://github.com/uclouvain/openjpeg/issues/860 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9580 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/94822 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255 https://github.com/uclouvain/openjpeg/issues/871 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2016-9581 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/94822 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255 https://github.com/uclouvain/openjpeg/issues/872 https://security.gentoo.org/glsa/201710-26
|
libopenjp2-7 | CVE-2017-17479 | LOW | 2.3.0-2+deb10u2 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479 https://github.com/uclouvain/openjpeg/issues/1044
|
libopenjp2-7 | CVE-2018-16375 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/105266 https://github.com/uclouvain/openjpeg/issues/1126
|
libopenjp2-7 | CVE-2018-16376 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/105262 https://github.com/uclouvain/openjpeg/issues/1127
|
libopenjp2-7 | CVE-2018-20845 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/108921 https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf https://linux.oracle.com/cve/CVE-2018-20845.html https://linux.oracle.com/errata/ELSA-2021-4251.html
|
libopenjp2-7 | CVE-2018-20846 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/108921 https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
|
libopenjp2-7 | CVE-2018-5727 | LOW | 2.3.0-2+deb10u2 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727 https://github.com/uclouvain/openjpeg/issues/1053 https://linux.oracle.com/cve/CVE-2018-5727.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://ubuntu.com/security/notices/USN-4686-1
|
libopenjp2-7 | CVE-2018-7648 | LOW | 2.3.0-2+deb10u2 | | Expand...https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d https://github.com/uclouvain/openjpeg/issues/1088
|
libopenjp2-7 | CVE-2019-6988 | LOW | 2.3.0-2+deb10u2 | | Expand...http://www.securityfocus.com/bid/106785 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988 https://github.com/uclouvain/openjpeg/issues/1178
|
libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | | Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html http://seclists.org/fulldisclosure/2018/Dec/33 http://www.openwall.com/lists/oss-security/2017/11/01/11 http://www.openwall.com/lists/oss-security/2017/11/01/3 http://www.openwall.com/lists/oss-security/2017/11/01/7 http://www.openwall.com/lists/oss-security/2017/11/01/8 http://www.securityfocus.com/bid/101688 https://bugs.exim.org/show_bug.cgi?id=2047
|
libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpng16-16 | CVE-2018-14048 | LOW | 1.6.36-6 | | Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048 https://github.com/fouzhe/security/tree/master/libpng https://github.com/glennrp/libpng/issues/238 https://seclists.org/bugtraq/2019/Apr/30 https://security.gentoo.org/glsa/201908-02
|
libpng16-16 | CVE-2018-14550 | LOW | 1.6.36-6 | | Expand...https://github.com/advisories/GHSA-qwwr-qc2p-6283 https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token https://github.com/glennrp/libpng/issues/246 https://nvd.nist.gov/vuln/detail/CVE-2018-14550 https://security.gentoo.org/glsa/201908-02 https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612 https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpng16-16 | CVE-2019-6129 | LOW | 1.6.36-6 | | Expand...https://github.com/glennrp/libpng/issues/269 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
libpng16-16 | CVE-2021-4214 | LOW | 1.6.36-6 | | Expand... |
libpq5 | CVE-2019-9193 | LOW | 11.14-0+deb10u1 | | Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ https://security.netapp.com/advisory/ntap-20190502-0003/ https://www.postgresql.org/about/news/1935/ https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
|
libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html https://access.redhat.com/errata/RHSA-2019:3624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893 https://github.com/seccomp/libseccomp/issues/139 https://linux.oracle.com/cve/CVE-2019-9893.html https://linux.oracle.com/errata/ELSA-2019-3624.html https://seclists.org/oss-sec/2019/q1/179 https://security.gentoo.org/glsa/201904-18 https://ubuntu.com/security/notices/USN-4001-1 https://ubuntu.com/security/notices/USN-4001-2 https://usn.ubuntu.com/4001-1/ https://usn.ubuntu.com/4001-2/ https://www.openwall.com/lists/oss-security/2019/03/15/1
|
libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
|
libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603 https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13 https://linux.oracle.com/cve/CVE-2019-19603.html https://linux.oracle.com/errata/ELSA-2021-4396.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://security.netapp.com/advisory/ntap-20191223-0001/ https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.sqlite.org/
|
libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645 https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06 https://security.netapp.com/advisory/ntap-20191223-0001/ https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924 https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3 https://linux.oracle.com/cve/CVE-2019-19924.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20200114-0003/ https://ubuntu.com/security/notices/USN-4298-1 https://usn.ubuntu.com/4298-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2020/Nov/19 http://seclists.org/fulldisclosure/2020/Nov/20 http://seclists.org/fulldisclosure/2020/Nov/22 https://bugs.chromium.org/p/chromium/issues/detail?id=1080459 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631 https://linux.oracle.com/cve/CVE-2020-13631.html https://linux.oracle.com/errata/ELSA-2020-4442.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/ https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc https://security.gentoo.org/glsa/202007-26 https://security.netapp.com/advisory/ntap-20200608-0002/ https://sqlite.org/src/info/eca0ba2cf4c0fdf7 https://support.apple.com/kb/HT211843 https://support.apple.com/kb/HT211844 https://support.apple.com/kb/HT211850 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT211935 https://support.apple.com/kb/HT211952 https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | | Expand...https://github.com/guyinatuxedo/sqlite3_record_leaking https://security.netapp.com/advisory/ntap-20220303-0001/
|
libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244 https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348 https://ubuntu.com/security/notices/USN-4205-1 https://usn.ubuntu.com/4205-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | | Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc https://security.gentoo.org/glsa/202007-26 https://security.netapp.com/advisory/ntap-20200416-0001/ https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.sqlite.org/src/info/d09f8c3621d5f7f8 https://www3.sqlite.org/cgi/src/info/b64674919f673602
|
libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | | Expand...https://blog.semmle.com/libssh2-integer-overflow/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115 https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa https://github.com/libssh2/libssh2/pull/350 https://libssh2.org/changes.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/ https://security.netapp.com/advisory/ntap-20190806-0002/ https://support.f5.com/csp/article/K13322484 https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
|
libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498 https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498 https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480 https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94 https://linux.oracle.com/cve/CVE-2019-17498.html https://linux.oracle.com/errata/ELSA-2020-3915.html https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
|
libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb https://www.openssl.org/news/secadv/20220128.txt
|
libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/ http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html http://rump2007.cr.yp.to/15-shumow.pdf http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect http://www.securityfocus.com/bid/63657 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
|
libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/ http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf http://www.networkworld.com/news/2010/030410-rsa-security-attack.html http://www.osvdb.org/62808 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/ https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
|
libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | Expand...http://www.securityfocus.com/bid/108116 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843 https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable) https://linux.oracle.com/cve/CVE-2019-3843.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/ https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | Expand...http://www.securityfocus.com/bid/108096 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844 https://linux.oracle.com/cve/CVE-2019-3844.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad https://linux.oracle.com/cve/CVE-2019-20386.html https://linux.oracle.com/errata/ELSA-2020-4553.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/ https://security.netapp.com/advisory/ntap-20200210-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | Expand...https://github.com/systemd/systemd/issues/15985 https://linux.oracle.com/cve/CVE-2020-13776.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/ https://security.netapp.com/advisory/ntap-20200611-0003/
|
libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html http://www.securityfocus.com/bid/105151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654 https://gitlab.com/gnutls/libtasn1/issues/4 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 | CVE-2022-0561 | MEDIUM | 4.1.0+git191117-2~deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
|
libtiff5 | CVE-2022-0562 | MEDIUM | 4.1.0+git191117-2~deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
|
libtiff5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2~deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865 https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067 https://gitlab.com/libtiff/libtiff/-/issues/385 https://gitlab.com/libtiff/libtiff/-/merge_requests/306
|
libtiff5 | CVE-2022-22844 | MEDIUM | 4.1.0+git191117-2~deb10u3 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
|
libtiff5 | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483 http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html http://openwall.com/lists/oss-security/2015/01/24/15 http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://support.apple.com/kb/HT204941 http://support.apple.com/kb/HT204942 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt http://www.securityfocus.com/bid/72353 http://www.securitytracker.com/id/1032760 https://bugzilla.redhat.com/show_bug.cgi?id=1185817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543 https://linux.oracle.com/cve/CVE-2014-8130.html https://linux.oracle.com/errata/ELSA-2016-1547.html https://security.gentoo.org/glsa/201701-16 https://ubuntu.com/security/notices/USN-2553-1
|
libtiff5 | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html http://seclists.org/fulldisclosure/2018/Dec/32 http://seclists.org/fulldisclosure/2018/Dec/47 http://www.openwall.com/lists/oss-security/2017/11/01/11 http://www.openwall.com/lists/oss-security/2017/11/01/3 http://www.openwall.com/lists/oss-security/2017/11/01/7 http://www.openwall.com/lists/oss-security/2017/11/01/8 http://www.securityfocus.com/bid/101696
|
libtiff5 | CVE-2017-17973 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769 http://www.securityfocus.com/bid/102331 https://bugzilla.novell.com/show_bug.cgi?id=1074318 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
|
libtiff5 | CVE-2017-5563 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664 http://www.securityfocus.com/bid/95705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563 https://security.gentoo.org/glsa/201709-27 https://ubuntu.com/security/notices/USN-3606-1 https://usn.ubuntu.com/3606-1/
|
libtiff5 | CVE-2017-9117 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690 http://www.securityfocus.com/bid/98581 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117 https://ubuntu.com/security/notices/USN-3606-1 https://usn.ubuntu.com/3606-1/
|
libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 | CVE-2020-35521 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034 https://linux.oracle.com/cve/CVE-2020-35521.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtiff5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | Expand...http://www.securityfocus.com/bid/108116 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843 https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable) https://linux.oracle.com/cve/CVE-2019-3843.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/ https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | Expand...http://www.securityfocus.com/bid/108096 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844 https://linux.oracle.com/cve/CVE-2019-3844.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad https://linux.oracle.com/cve/CVE-2019-20386.html https://linux.oracle.com/errata/ELSA-2020-4553.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/ https://security.netapp.com/advisory/ntap-20200210-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | Expand...https://github.com/systemd/systemd/issues/15985 https://linux.oracle.com/cve/CVE-2020-13776.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/ https://security.netapp.com/advisory/ntap-20200611-0003/
|
libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3 http://www.securityfocus.com/bid/93928 https://bugzilla.redhat.com/show_bug.cgi?id=1389338 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/ https://security.gentoo.org/glsa/201701-61
|
libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3 http://www.securityfocus.com/bid/93928 https://bugzilla.redhat.com/show_bug.cgi?id=1389338 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/ https://security.gentoo.org/glsa/201701-61
|
libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | | Expand...http://xmlsoft.org/news.html https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html https://bugzilla.gnome.org/show_bug.cgi?id=759579 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932 https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961 https://github.com/sparklemotion/nokogiri/issues/1714 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html https://ubuntu.com/security/notices/USN-3504-1 https://ubuntu.com/security/notices/USN-3504-2 https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/usn/usn-3504-1/
|
libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | | Expand...https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
|
libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | | Expand...http://www.securityfocus.com/bid/94347 https://bugzilla.gnome.org/show_bug.cgi?id=772726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 https://github.com/lsh123/xmlsec/issues/43 https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | | Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400 https://bugzilla.suse.com/show_bug.cgi?id=934119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
|
login | CVE-2007-5686 | LOW | 1:4.5-1.1 | | Expand...http://secunia.com/advisories/27215 http://www.securityfocus.com/archive/1/482129/100/100/threaded http://www.securityfocus.com/archive/1/482857/100/0/threaded http://www.securityfocus.com/bid/26048 http://www.vupen.com/english/advisories/2007/3474 https://issues.rpath.com/browse/RPL-1825
|
login | CVE-2013-4235 | LOW | 1:4.5-1.1 | | Expand...https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
login | CVE-2018-7169 | LOW | 1:4.5-1.1 | | Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 https://github.com/shadow-maint/shadow/pull/97 https://security.gentoo.org/glsa/201805-09 https://ubuntu.com/security/notices/USN-5254-1
|
login | CVE-2019-19882 | LOW | 1:4.5-1.1 | | Expand...https://bugs.archlinux.org/task/64836 https://bugs.gentoo.org/702252 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75 https://github.com/shadow-maint/shadow/pull/199 https://github.com/void-linux/void-packages/pull/17580 https://security.gentoo.org/glsa/202008-09
|
mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|
ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb https://www.openssl.org/news/secadv/20220128.txt
|
openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/ http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html http://rump2007.cr.yp.to/15-shumow.pdf http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect http://www.securityfocus.com/bid/63657 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
|
openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/ http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf http://www.networkworld.com/news/2010/030410-rsa-security-attack.html http://www.osvdb.org/62808 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/ https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
|
passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | Expand...http://secunia.com/advisories/27215 http://www.securityfocus.com/archive/1/482129/100/100/threaded http://www.securityfocus.com/archive/1/482857/100/0/threaded http://www.securityfocus.com/bid/26048 http://www.vupen.com/english/advisories/2007/3474 https://issues.rpath.com/browse/RPL-1825
|
passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | Expand...https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 https://github.com/shadow-maint/shadow/pull/97 https://security.gentoo.org/glsa/201805-09 https://ubuntu.com/security/notices/USN-5254-1
|
passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | Expand...https://bugs.archlinux.org/task/64836 https://bugs.gentoo.org/702252 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75 https://github.com/shadow-maint/shadow/pull/199 https://github.com/void-linux/void-packages/pull/17580 https://security.gentoo.org/glsa/202008-09
|
perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2 http://www.openwall.com/lists/oss-security/2011/11/04/4 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14 https://rt.cpan.org/Public/Bug/Display.html?id=69106 https://seclists.org/oss-sec/2011/q4/238
|
tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
|
tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html http://savannah.gnu.org/bugs/?55369 https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://ubuntu.com/security/notices/USN-4692-1
|
tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 https://savannah.gnu.org/bugs/?59897 https://security.gentoo.org/glsa/202105-29
|
util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
|