scale-catalog/apps/incubator/ml-workspace/security/index.html
2022-07-12 19:14:37 +00:00

4 lines
2.0 MiB
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!doctype html><html lang=en class=no-js> <head><meta charset=utf-8><meta name=viewport content="width=device-width,initial-scale=1"><meta name=description content="Project Documentation for TrueCharts"><meta name=author content="TrueCharts Team"><link href=https://truecharts.org/apps/incubator/ml-workspace/security/ rel=canonical><link rel=icon href=../../../../_static/img/favicon.png><meta name=generator content="mkdocs-1.3.0, mkdocs-material-8.3.8"><title>Security Overview - TrueCharts</title><link rel=stylesheet href=../../../../assets/stylesheets/main.1d29e8d0.min.css><link rel=stylesheet href=../../../../assets/stylesheets/palette.cbb835fc.min.css><link rel=preconnect href=https://fonts.gstatic.com crossorigin><link rel=stylesheet href="https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,700,700i%7CRoboto+Mono:400,400i,700,700i&display=fallback"><style>:root{--md-text-font:"Roboto";--md-code-font:"Roboto Mono"}</style><link rel=stylesheet href=../../../../_static/custom.css><script>__md_scope=new URL("../../../..",location),__md_get=(e,_=localStorage,t=__md_scope)=>JSON.parse(_.getItem(t.pathname+"."+e)),__md_set=(e,_,t=localStorage,a=__md_scope)=>{try{t.setItem(a.pathname+"."+e,JSON.stringify(_))}catch(e){}}</script><script>function gtag(){dataLayer.push(arguments)}window.dataLayer=window.dataLayer||[],gtag("js",new Date),gtag("config","G-6G6694723V"),document.addEventListener("DOMContentLoaded",function(){document.forms.search&&document.forms.search.query.addEventListener("blur",function(){this.value&&gtag("event","search",{search_term:this.value})}),"undefined"!=typeof location$&&location$.subscribe(function(e){gtag("config","G-6G6694723V",{page_path:e.pathname})})})</script><script async src="https://www.googletagmanager.com/gtag/js?id=G-6G6694723V"></script></head> <body dir=ltr data-md-color-scheme data-md-color-primary=none data-md-color-accent=none> <input class=md-toggle data-md-toggle=drawer type=checkbox id=__drawer autocomplete=off> <input class=md-toggle data-md-toggle=search type=checkbox id=__search autocomplete=off> <label class=md-overlay for=__drawer></label> <div data-md-component=skip> <a href=#security-overview class=md-skip> Skip to content </a> </div> <div data-md-component=announce> </div> <header class=md-header data-md-component=header> <nav class="md-header__inner md-grid" aria-label=Header> <a href=../../../.. title=TrueCharts class="md-header__button md-logo" aria-label=TrueCharts data-md-component=logo> <img src=../../../../_static/img/logo1024.png alt=logo> </a> <label class="md-header__button md-icon" for=__drawer> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 24 24"><path d="M3 6h18v2H3V6m0 5h18v2H3v-2m0 5h18v2H3v-2Z"/></svg> </label> <div class=md-header__title data-md-component=header-title> <div class=md-header__ellipsis> <div class=md-header__topic> <span class=md-ellipsis> TrueCharts </span> </div> <div class=md-header__topic data-md-component=header-topic> <span class=md-ellipsis> Security Overview </span> </div> </div> </div> <div class=md-header__source> <a href=https://github.com/truecharts/pub title="Go to repository" class=md-source data-md-component=source> <div class="md-source__icon md-icon"> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 480 512"><!-- Font Awesome Free 6.1.1 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M186.1 328.7c0 20.9-10.9 55.1-36.7 55.1s-36.7-34.2-36.7-55.1 10.9-55.1 36.7-55.1 36.7 34.2 36.7 55.1zM480 278.2c0 31.9-3.2 65.7-17.5 95-37.9 76.6-142.1 74.8-216.7 74.8-75.8 0-186.2 2.7-225.6-74.8-14.6-29-20.2-63.1-20.2-95 0-41.9 13.9-81.5 41.5-113.6-5.2-15.8-7.7-32.4-7.7-48.8 0-21.5 4.9-32.3 14.6-51.8 45.3 0 74.3 9 108.8 36 29-6.9 58.8-10 88.7-10 27 0 54.2 2.9 80.4 9.2 34-26.7 63-35.2 107.8-35.2 9.8 19.5 14.6 30.3 14.6 51.8 0 16.4-2.6 32.7-7.7 48.2 27.5 32.4 39 72.3 39 114.2zm-64.3 50.5c0-43.9-26.7-82.6-73.5-82.6-18.9 0-37 3.4-56 6-14.9 2.3-29.8 3.2-45.1 3.2-15.2 0-30.1-.9-45.1-3.2-18.7-2.6-37-6-56-6-46.8 0-73.5 38.7-73.5 82.6 0 87.8 80.4 101.3 150.4 101.3h48.2c70.3 0 150.6-13.4 150.6-101.3zm-82.6-55.1c-25.8 0-36.7 34.2-36.7 55.1s10.9 55.1 36.7 55.1 36.7-34.2 36.7-55.1-10.9-55.1-36.7-55.1z"/></svg> </div> <div class=md-source__repository> truecharts/pub </div> </a> </div> </nav> </header> <div class=md-container data-md-component=container> <nav class=md-tabs aria-label=Tabs data-md-component=tabs> <div class="md-tabs__inner md-grid"> <ul class=md-tabs__list> <li class=md-tabs__item> <a href=../../../.. class=md-tabs__link> TrueCharts<br> </a> </li> <li class=md-tabs__item> <a href=../../../../about/ class=md-tabs__link> About </a> </li> <li class=md-tabs__item> <a href=../../../../blog/ class=md-tabs__link> Blog </a> </li> <li class=md-tabs__item> <a href=../../../../manual/SUPPORT/ class=md-tabs__link> Manual </a> </li> <li class=md-tabs__item> <a href=../../../common/ class="md-tabs__link md-tabs__link--active"> Apps </a> </li> </ul> </div> </nav> <main class=md-main data-md-component=main> <div class="md-main__inner md-grid"> <div class="md-sidebar md-sidebar--primary" data-md-component=sidebar data-md-type=navigation> <div class=md-sidebar__scrollwrap> <div class=md-sidebar__inner> <nav class="md-nav md-nav--primary md-nav--lifted" aria-label=Navigation data-md-level=0> <label class=md-nav__title for=__drawer> <a href=../../../.. title=TrueCharts class="md-nav__button md-logo" aria-label=TrueCharts data-md-component=logo> <img src=../../../../_static/img/logo1024.png alt=logo> </a> TrueCharts </label> <div class=md-nav__source> <a href=https://github.com/truecharts/pub title="Go to repository" class=md-source data-md-component=source> <div class="md-source__icon md-icon"> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 480 512"><!-- Font Awesome Free 6.1.1 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M186.1 328.7c0 20.9-10.9 55.1-36.7 55.1s-36.7-34.2-36.7-55.1 10.9-55.1 36.7-55.1 36.7 34.2 36.7 55.1zM480 278.2c0 31.9-3.2 65.7-17.5 95-37.9 76.6-142.1 74.8-216.7 74.8-75.8 0-186.2 2.7-225.6-74.8-14.6-29-20.2-63.1-20.2-95 0-41.9 13.9-81.5 41.5-113.6-5.2-15.8-7.7-32.4-7.7-48.8 0-21.5 4.9-32.3 14.6-51.8 45.3 0 74.3 9 108.8 36 29-6.9 58.8-10 88.7-10 27 0 54.2 2.9 80.4 9.2 34-26.7 63-35.2 107.8-35.2 9.8 19.5 14.6 30.3 14.6 51.8 0 16.4-2.6 32.7-7.7 48.2 27.5 32.4 39 72.3 39 114.2zm-64.3 50.5c0-43.9-26.7-82.6-73.5-82.6-18.9 0-37 3.4-56 6-14.9 2.3-29.8 3.2-45.1 3.2-15.2 0-30.1-.9-45.1-3.2-18.7-2.6-37-6-56-6-46.8 0-73.5 38.7-73.5 82.6 0 87.8 80.4 101.3 150.4 101.3h48.2c70.3 0 150.6-13.4 150.6-101.3zm-82.6-55.1c-25.8 0-36.7 34.2-36.7 55.1s10.9 55.1 36.7 55.1 36.7-34.2 36.7-55.1-10.9-55.1-36.7-55.1z"/></svg> </div> <div class=md-source__repository> truecharts/pub </div> </a> </div> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../.. class=md-nav__link> TrueCharts<br> </a> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_2 type=checkbox id=__nav_2> <label class=md-nav__link for=__nav_2> About <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=About data-md-level=1> <label class=md-nav__title for=__nav_2> <span class="md-nav__icon md-icon"></span> About </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../about/ class=md-nav__link> FAQ </a> </li> <li class=md-nav__item> <a href=../../../../about/code_of_conduct/ class=md-nav__link> Code of Conduct </a> </li> <li class=md-nav__item> <a href=../../../../about/contact/ class=md-nav__link> Get in Contact </a> </li> <li class=md-nav__item> <a href=../../../../about/sponsor/ class=md-nav__link> Sponsors Us </a> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_2_5 type=checkbox id=__nav_2_5> <label class=md-nav__link for=__nav_2_5> Legal <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Legal data-md-level=2> <label class=md-nav__title for=__nav_2_5> <span class="md-nav__icon md-icon"></span> Legal </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../about/legal/Apach2-licence/ class=md-nav__link> Apache2.0 License </a> </li> <li class=md-nav__item> <a href=../../../../about/legal/LICENSE/ class=md-nav__link> License<br> </a> </li> <li class=md-nav__item> <a href=../../../../about/legal/NOTICE/ class=md-nav__link> NOTICE<br> </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_2_6 type=checkbox id=__nav_2_6> <label class=md-nav__link for=__nav_2_6> Staff <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Staff data-md-level=2> <label class=md-nav__title for=__nav_2_6> <span class="md-nav__icon md-icon"></span> Staff </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../about/staff/ class=md-nav__link> Official Accounts and Staff list </a> </li> <li class=md-nav__item> <a href=../../../../about/staff/socialmedia/ class=md-nav__link> Socialmedia Guidelines </a> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3 type=checkbox id=__nav_3> <label class=md-nav__link for=__nav_3> Blog <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Blog data-md-level=1> <label class=md-nav__title for=__nav_3> <span class="md-nav__icon md-icon"></span> Blog </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../blog/ class=md-nav__link> Blog </a> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3_2 type=checkbox id=__nav_3_2> <label class=md-nav__link for=__nav_3_2> 2021 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=2021 data-md-level=2> <label class=md-nav__title for=__nav_3_2> <span class="md-nav__icon md-icon"></span> 2021 </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3_2_1 type=checkbox id=__nav_3_2_1> <label class=md-nav__link for=__nav_3_2_1> Dec <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Dec data-md-level=3> <label class=md-nav__title for=__nav_3_2_1> <span class="md-nav__icon md-icon"></span> Dec </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../blog/2021/dec/16-12-2021/ class=md-nav__link> Meet TrueCharts - the First App Store for TrueNAS SCALE </a> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3_3 type=checkbox id=__nav_3_3> <label class=md-nav__link for=__nav_3_3> 2022 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=2022 data-md-level=2> <label class=md-nav__title for=__nav_3_3> <span class="md-nav__icon md-icon"></span> 2022 </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3_3_1 type=checkbox id=__nav_3_3_1> <label class=md-nav__link for=__nav_3_3_1> Jan <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Jan data-md-level=3> <label class=md-nav__title for=__nav_3_3_1> <span class="md-nav__icon md-icon"></span> Jan </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../blog/2022/jan/24-01-2022/ class=md-nav__link> Introducing: TrueCharts Container Repository </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3_3_2 type=checkbox id=__nav_3_3_2> <label class=md-nav__link for=__nav_3_3_2> June <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=June data-md-level=3> <label class=md-nav__title for=__nav_3_3_2> <span class="md-nav__icon md-icon"></span> June </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../blog/2022/june/06-06-2022/ class=md-nav__link> Helm as a foundation </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_3_3_3 type=checkbox id=__nav_3_3_3> <label class=md-nav__link for=__nav_3_3_3> March <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=March data-md-level=3> <label class=md-nav__title for=__nav_3_3_3> <span class="md-nav__icon md-icon"></span> March </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../blog/2022/march/06-03-2022/ class=md-nav__link> Docker-Compose on TrueNAS SCALE using TrueCharts </a> </li> </ul> </nav> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4 type=checkbox id=__nav_4> <label class=md-nav__link for=__nav_4> Manual <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Manual data-md-level=1> <label class=md-nav__title for=__nav_4> <span class="md-nav__icon md-icon"></span> Manual </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../manual/SUPPORT/ class=md-nav__link> Support Policy </a> </li> <li class=md-nav__item> <a href=../../../../manual/default-ports/ class=md-nav__link> Default Ports </a> </li> <li class=md-nav__item> <a href=../../../../manual/description_list/ class=md-nav__link> Apps List </a> </li> <li class=md-nav__item> <a href=../../../../manual/migration/ class=md-nav__link> Migration between versions </a> </li> <li class=md-nav__item> <a href=../../../../manual/systemrequirements/ class=md-nav__link> System Requirements </a> </li> <li class=md-nav__item> <a href=../../../../manual/volume_list/ class=md-nav__link> Mounted Volumes </a> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4_7 type=checkbox id=__nav_4_7> <label class=md-nav__link for=__nav_4_7> Quick Start Guides <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Quick Start Guides" data-md-level=2> <label class=md-nav__title for=__nav_4_7> <span class="md-nav__icon md-icon"></span> Quick Start Guides </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../manual/Quick-Start%20Guides/01-Adding-TrueCharts/ class=md-nav__link> 01 - Adding TrueCharts to SCALE </a> </li> <li class=md-nav__item> <a href=../../../../manual/Quick-Start%20Guides/06-linking-apps/ class=md-nav__link> 06 - Linking Apps Internally </a> </li> <li class=md-nav__item> <a href=../../../../manual/Quick-Start%20Guides/15-pvc-access/ class=md-nav__link> 15 - Accessing PVC Data </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4_8 type=checkbox id=__nav_4_8> <label class=md-nav__link for=__nav_4_8> SCALE Apps <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="SCALE Apps" data-md-level=2> <label class=md-nav__title for=__nav_4_8> <span class="md-nav__icon md-icon"></span> SCALE Apps </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4_8_1 type=checkbox id=__nav_4_8_1> <label class=md-nav__link for=__nav_4_8_1> Community Examples <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Community Examples" data-md-level=3> <label class=md-nav__title for=__nav_4_8_1> <span class="md-nav__icon md-icon"></span> Community Examples </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Community%20Examples/pci-passthrough/ class=md-nav__link> PCI(-E) Devices Passthrough </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Community%20Examples/truenas-web-gui-via-traefik/ class=md-nav__link> TrueNAS Web GUI via Traefik on port 443 </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4_8_2 type=checkbox id=__nav_4_8_2> <label class=md-nav__link for=__nav_4_8_2> Quick Start Guides <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Quick Start Guides" data-md-level=3> <label class=md-nav__title for=__nav_4_8_2> <span class="md-nav__icon md-icon"></span> Quick Start Guides </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/00-Important-MUST-READ/ class=md-nav__link> 00 - IMPORTANT: Must Read! </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/01-Adding-TrueCharts/ class=md-nav__link> 01 - Adding TrueCharts to SCALE </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/02-Installing-an-App/ class=md-nav__link> 02 - Installing Apps </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/03-Edit-an-App/ class=md-nav__link> 03 - Editing Apps </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/ class=md-nav__link> 04 - Upgrading, Rollback and Delete </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/05-add-storage/ class=md-nav__link> 05 - Adding additional storage </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/06-linking-apps/ class=md-nav__link> 06 - Linking Apps Internally </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/07-adding-letsencrypt/ class=md-nav__link> 07 - Adding Lets-Encrypt Certificates </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/08-installing-Traefik/ class=md-nav__link> 08 - Installing Traefik </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/09-add-ingress/ class=md-nav__link> 09 - Exposing Apps using Ingress and Traefik </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/10-add-middleware/ class=md-nav__link> 10 - Add Traefik Middleware to Apps </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/11-external-services/ class=md-nav__link> 11 - Setting up External-Services </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/12-vpn-setup/ class=md-nav__link> 12 - VPN Addon Setup </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/13-docker-compose/ class=md-nav__link> 13 - Docker-Compose on SCALE </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/14-backup-restore/ class=md-nav__link> 14 - Backup and Restore </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/Quick-Start%20Guides/15-pvc-access/ class=md-nav__link> 15 - Accessing PVC Data </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4_8_3 type=checkbox id=__nav_4_8_3> <label class=md-nav__link for=__nav_4_8_3> Indepth <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Indepth data-md-level=3> <label class=md-nav__title for=__nav_4_8_3> <span class="md-nav__icon md-icon"></span> Indepth </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/indepth/certificates/ class=md-nav__link> How to: Create Certificates </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/indepth/clustering/ class=md-nav__link> Clustering </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/indepth/networking/ class=md-nav__link> Networking </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/indepth/storage/ class=md-nav__link> Storage </a> </li> <li class=md-nav__item> <a href=../../../../manual/SCALE%20Apps/indepth/validation/ class=md-nav__link> Validation </a> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_4_9 type=checkbox id=__nav_4_9> <label class=md-nav__link for=__nav_4_9> Development <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Development data-md-level=2> <label class=md-nav__title for=__nav_4_9> <span class="md-nav__icon md-icon"></span> Development </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../../manual/development/License-headers/ class=md-nav__link> License Header Format </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/chart-structure/ class=md-nav__link> TrueNAS SCALE Chart Structure </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/chart-yaml-structure/ class=md-nav__link> Chart.yaml layout </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/common-libary/ class=md-nav__link> Common Library Chart </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/contributing/ class=md-nav__link> Contribution Guidelines </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/getting-started/ class=md-nav__link> Getting Started </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/handycommands/ class=md-nav__link> Command Cheatsheet </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/ingress/ class=md-nav__link> Ingress </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/portal/ class=md-nav__link> Portal Button </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/questions-yaml/ class=md-nav__link> Questions.yaml </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/services/ class=md-nav__link> Services </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/storage/ class=md-nav__link> Storage </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/unit-tests/ class=md-nav__link> Unit tests </a> </li> <li class=md-nav__item> <a href=../../../../manual/development/values-yaml/ class=md-nav__link> Values.yaml Files </a> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--active md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5 type=checkbox id=__nav_5 checked> <label class=md-nav__link for=__nav_5> Apps <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Apps data-md-level=1> <label class=md-nav__title for=__nav_5> <span class="md-nav__icon md-icon"></span> Apps </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_1 type=checkbox id=__nav_5_1> <label class=md-nav__link for=__nav_5_1> Common <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Common data-md-level=2> <label class=md-nav__title for=__nav_5_1> <span class="md-nav__icon md-icon"></span> Common </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../common/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../common/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2 type=checkbox id=__nav_5_2> <label class=md-nav__link for=__nav_5_2> Dependency <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Dependency data-md-level=2> <label class=md-nav__title for=__nav_5_2> <span class="md-nav__icon md-icon"></span> Dependency </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2_1 type=checkbox id=__nav_5_2_1> <label class=md-nav__link for=__nav_5_2_1> Mariadb <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mariadb data-md-level=3> <label class=md-nav__title for=__nav_5_2_1> <span class="md-nav__icon md-icon"></span> Mariadb </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../dependency/mariadb/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../dependency/mariadb/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../dependency/mariadb/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../dependency/mariadb/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../dependency/mariadb/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2_2 type=checkbox id=__nav_5_2_2> <label class=md-nav__link for=__nav_5_2_2> Memcached <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Memcached data-md-level=3> <label class=md-nav__title for=__nav_5_2_2> <span class="md-nav__icon md-icon"></span> Memcached </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../dependency/memcached/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../dependency/memcached/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../dependency/memcached/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../dependency/memcached/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../dependency/memcached/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2_3 type=checkbox id=__nav_5_2_3> <label class=md-nav__link for=__nav_5_2_3> Mongodb <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mongodb data-md-level=3> <label class=md-nav__title for=__nav_5_2_3> <span class="md-nav__icon md-icon"></span> Mongodb </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../dependency/mongodb/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../dependency/mongodb/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../dependency/mongodb/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../dependency/mongodb/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../dependency/mongodb/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2_4 type=checkbox id=__nav_5_2_4> <label class=md-nav__link for=__nav_5_2_4> Postgresql <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Postgresql data-md-level=3> <label class=md-nav__title for=__nav_5_2_4> <span class="md-nav__icon md-icon"></span> Postgresql </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../dependency/postgresql/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../dependency/postgresql/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../dependency/postgresql/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../dependency/postgresql/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../dependency/postgresql/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2_5 type=checkbox id=__nav_5_2_5> <label class=md-nav__link for=__nav_5_2_5> Promtail <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Promtail data-md-level=3> <label class=md-nav__title for=__nav_5_2_5> <span class="md-nav__icon md-icon"></span> Promtail </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../dependency/promtail/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../dependency/promtail/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../dependency/promtail/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../dependency/promtail/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../dependency/promtail/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_2_6 type=checkbox id=__nav_5_2_6> <label class=md-nav__link for=__nav_5_2_6> Redis <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Redis data-md-level=3> <label class=md-nav__title for=__nav_5_2_6> <span class="md-nav__icon md-icon"></span> Redis </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../dependency/redis/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../dependency/redis/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../dependency/redis/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../dependency/redis/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../dependency/redis/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--active md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3 type=checkbox id=__nav_5_3 checked> <label class=md-nav__link for=__nav_5_3> Incubator <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Incubator data-md-level=2> <label class=md-nav__title for=__nav_5_3> <span class="md-nav__icon md-icon"></span> Incubator </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_1 type=checkbox id=__nav_5_3_1> <label class=md-nav__link for=__nav_5_3_1> Automatic music downloader <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Automatic music downloader" data-md-level=3> <label class=md-nav__title for=__nav_5_3_1> <span class="md-nav__icon md-icon"></span> Automatic music downloader </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../automatic-music-downloader/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../automatic-music-downloader/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../automatic-music-downloader/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../automatic-music-downloader/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../automatic-music-downloader/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_2 type=checkbox id=__nav_5_3_2> <label class=md-nav__link for=__nav_5_3_2> Browserless chrome <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Browserless chrome" data-md-level=3> <label class=md-nav__title for=__nav_5_3_2> <span class="md-nav__icon md-icon"></span> Browserless chrome </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../browserless-chrome/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../browserless-chrome/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../browserless-chrome/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../browserless-chrome/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../browserless-chrome/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_3 type=checkbox id=__nav_5_3_3> <label class=md-nav__link for=__nav_5_3_3> Chevereto <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Chevereto data-md-level=3> <label class=md-nav__title for=__nav_5_3_3> <span class="md-nav__icon md-icon"></span> Chevereto </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../chevereto/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../chevereto/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../chevereto/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../chevereto/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../chevereto/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_4 type=checkbox id=__nav_5_3_4> <label class=md-nav__link for=__nav_5_3_4> Deemix <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Deemix data-md-level=3> <label class=md-nav__title for=__nav_5_3_4> <span class="md-nav__icon md-icon"></span> Deemix </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../deemix/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../deemix/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../deemix/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../deemix/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../deemix/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_5 type=checkbox id=__nav_5_3_5> <label class=md-nav__link for=__nav_5_3_5> Doplarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Doplarr data-md-level=3> <label class=md-nav__title for=__nav_5_3_5> <span class="md-nav__icon md-icon"></span> Doplarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../doplarr/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../doplarr/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../doplarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../doplarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../doplarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_6 type=checkbox id=__nav_5_3_6> <label class=md-nav__link for=__nav_5_3_6> Double take <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Double take" data-md-level=3> <label class=md-nav__title for=__nav_5_3_6> <span class="md-nav__icon md-icon"></span> Double take </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../double-take/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../double-take/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../double-take/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../double-take/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../double-take/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_7 type=checkbox id=__nav_5_3_7> <label class=md-nav__link for=__nav_5_3_7> Filebrowser <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Filebrowser data-md-level=3> <label class=md-nav__title for=__nav_5_3_7> <span class="md-nav__icon md-icon"></span> Filebrowser </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../filebrowser/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../filebrowser/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../filebrowser/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../filebrowser/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../filebrowser/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_8 type=checkbox id=__nav_5_3_8> <label class=md-nav__link for=__nav_5_3_8> Filerun <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Filerun data-md-level=3> <label class=md-nav__title for=__nav_5_3_8> <span class="md-nav__icon md-icon"></span> Filerun </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../filerun/ class=md-nav__link> filerun </a> </li> <li class=md-nav__item> <a href=../../filerun/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../filerun/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../filerun/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../filerun/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_9 type=checkbox id=__nav_5_3_9> <label class=md-nav__link for=__nav_5_3_9> Flexget <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Flexget data-md-level=3> <label class=md-nav__title for=__nav_5_3_9> <span class="md-nav__icon md-icon"></span> Flexget </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../flexget/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../flexget/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../flexget/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../flexget/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../flexget/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_10 type=checkbox id=__nav_5_3_10> <label class=md-nav__link for=__nav_5_3_10> Frigate <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Frigate data-md-level=3> <label class=md-nav__title for=__nav_5_3_10> <span class="md-nav__icon md-icon"></span> Frigate </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../frigate/ class=md-nav__link> frigate </a> </li> <li class=md-nav__item> <a href=../../frigate/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../frigate/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../frigate/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../frigate/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_11 type=checkbox id=__nav_5_3_11> <label class=md-nav__link for=__nav_5_3_11> Hammond <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Hammond data-md-level=3> <label class=md-nav__title for=__nav_5_3_11> <span class="md-nav__icon md-icon"></span> Hammond </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../hammond/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../hammond/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../hammond/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../hammond/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../hammond/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_12 type=checkbox id=__nav_5_3_12> <label class=md-nav__link for=__nav_5_3_12> Homebridge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Homebridge data-md-level=3> <label class=md-nav__title for=__nav_5_3_12> <span class="md-nav__icon md-icon"></span> Homebridge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../homebridge/ class=md-nav__link> homebridge </a> </li> <li class=md-nav__item> <a href=../../homebridge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../homebridge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../homebridge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../homebridge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_13 type=checkbox id=__nav_5_3_13> <label class=md-nav__link for=__nav_5_3_13> Homer <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Homer data-md-level=3> <label class=md-nav__title for=__nav_5_3_13> <span class="md-nav__icon md-icon"></span> Homer </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../homer/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../homer/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../homer/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../homer/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../homer/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_14 type=checkbox id=__nav_5_3_14> <label class=md-nav__link for=__nav_5_3_14> Ispy agent dvr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Ispy agent dvr" data-md-level=3> <label class=md-nav__title for=__nav_5_3_14> <span class="md-nav__icon md-icon"></span> Ispy agent dvr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../ispy-agent-dvr/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../ispy-agent-dvr/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../ispy-agent-dvr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../ispy-agent-dvr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../ispy-agent-dvr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_15 type=checkbox id=__nav_5_3_15> <label class=md-nav__link for=__nav_5_3_15> Iyuuplus <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Iyuuplus data-md-level=3> <label class=md-nav__title for=__nav_5_3_15> <span class="md-nav__icon md-icon"></span> Iyuuplus </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../iyuuplus/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../iyuuplus/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../iyuuplus/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../iyuuplus/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../iyuuplus/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_16 type=checkbox id=__nav_5_3_16> <label class=md-nav__link for=__nav_5_3_16> Kavita <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kavita data-md-level=3> <label class=md-nav__title for=__nav_5_3_16> <span class="md-nav__icon md-icon"></span> Kavita </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../kavita/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../kavita/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../kavita/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../kavita/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../kavita/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_17 type=checkbox id=__nav_5_3_17> <label class=md-nav__link for=__nav_5_3_17> Kimai <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kimai data-md-level=3> <label class=md-nav__title for=__nav_5_3_17> <span class="md-nav__icon md-icon"></span> Kimai </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../kimai/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../kimai/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../kimai/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../kimai/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../kimai/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_18 type=checkbox id=__nav_5_3_18> <label class=md-nav__link for=__nav_5_3_18> Koel <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Koel data-md-level=3> <label class=md-nav__title for=__nav_5_3_18> <span class="md-nav__icon md-icon"></span> Koel </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../koel/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../koel/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../koel/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../koel/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../koel/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_19 type=checkbox id=__nav_5_3_19> <label class=md-nav__link for=__nav_5_3_19> Kutt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kutt data-md-level=3> <label class=md-nav__title for=__nav_5_3_19> <span class="md-nav__icon md-icon"></span> Kutt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../kutt/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../kutt/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../kutt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../kutt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../kutt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_20 type=checkbox id=__nav_5_3_20> <label class=md-nav__link for=__nav_5_3_20> Lanraragi <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Lanraragi data-md-level=3> <label class=md-nav__title for=__nav_5_3_20> <span class="md-nav__icon md-icon"></span> Lanraragi </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../lanraragi/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../lanraragi/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../lanraragi/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../lanraragi/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../lanraragi/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_21 type=checkbox id=__nav_5_3_21> <label class=md-nav__link for=__nav_5_3_21> Makemkv <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Makemkv data-md-level=3> <label class=md-nav__title for=__nav_5_3_21> <span class="md-nav__icon md-icon"></span> Makemkv </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../makemkv/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../makemkv/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../makemkv/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../makemkv/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../makemkv/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_22 type=checkbox id=__nav_5_3_22> <label class=md-nav__link for=__nav_5_3_22> Matomo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Matomo data-md-level=3> <label class=md-nav__title for=__nav_5_3_22> <span class="md-nav__icon md-icon"></span> Matomo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../matomo/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../matomo/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../matomo/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../matomo/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../matomo/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--active md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_23 type=checkbox id=__nav_5_3_23 checked> <label class=md-nav__link for=__nav_5_3_23> Ml workspace <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Ml workspace" data-md-level=3> <label class=md-nav__title for=__nav_5_3_23> <span class="md-nav__icon md-icon"></span> Ml workspace </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class="md-nav__item md-nav__item--active"> <input class="md-nav__toggle md-toggle" data-md-toggle=toc type=checkbox id=__toc> <label class="md-nav__link md-nav__link--active" for=__toc> Security Overview <span class="md-nav__icon md-icon"></span> </label> <a href=./ class="md-nav__link md-nav__link--active"> Security Overview </a> <nav class="md-nav md-nav--secondary" aria-label="Table of contents"> <label class=md-nav__title for=__toc> <span class="md-nav__icon md-icon"></span> Table of contents </label> <ul class=md-nav__list data-md-component=toc data-md-scrollfix> <li class=md-nav__item> <a href=#helm-chart class=md-nav__link> Helm-Chart </a> <nav class=md-nav aria-label=Helm-Chart> <ul class=md-nav__list> <li class=md-nav__item> <a href=#scan-results class=md-nav__link> Scan Results </a> </li> <li class=md-nav__item> <a href=#chart-object-ml-workspacetemplatescommonyaml class=md-nav__link> Chart Object: ml-workspace/templates/common.yaml </a> </li> </ul> </nav> </li> <li class=md-nav__item> <a href=#containers class=md-nav__link> Containers </a> <nav class=md-nav aria-label=Containers> <ul class=md-nav__list> <li class=md-nav__item> <a href=#detected-containers class=md-nav__link> Detected Containers </a> </li> <li class=md-nav__item> <a href=#scan-results_1 class=md-nav__link> Scan Results </a> </li> <li class=md-nav__item> <a href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152 class=md-nav__link> Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) </a> </li> <li class=md-nav__item> <a href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152_1 class=md-nav__link> Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) </a> </li> <li class=md-nav__item> <a href=#container-mltoolingml-workspace0132sha2565dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134-ubuntu-2004 class=md-nav__link> Container: mltooling/ml-workspace:0.13.2@sha256:5dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134 (ubuntu 20.04) </a> </li> </ul> </nav> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_24 type=checkbox id=__nav_5_3_24> <label class=md-nav__link for=__nav_5_3_24> Nextpvr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nextpvr data-md-level=3> <label class=md-nav__title for=__nav_5_3_24> <span class="md-nav__icon md-icon"></span> Nextpvr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../nextpvr/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../nextpvr/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../nextpvr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../nextpvr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../nextpvr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_25 type=checkbox id=__nav_5_3_25> <label class=md-nav__link for=__nav_5_3_25> Openhab <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Openhab data-md-level=3> <label class=md-nav__title for=__nav_5_3_25> <span class="md-nav__icon md-icon"></span> Openhab </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../openhab/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../openhab/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../openhab/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../openhab/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../openhab/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_26 type=checkbox id=__nav_5_3_26> <label class=md-nav__link for=__nav_5_3_26> Outline <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Outline data-md-level=3> <label class=md-nav__title for=__nav_5_3_26> <span class="md-nav__icon md-icon"></span> Outline </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../outline/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../outline/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../outline/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../outline/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../outline/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_27 type=checkbox id=__nav_5_3_27> <label class=md-nav__link for=__nav_5_3_27> Piwigo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Piwigo data-md-level=3> <label class=md-nav__title for=__nav_5_3_27> <span class="md-nav__icon md-icon"></span> Piwigo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../piwigo/ class=md-nav__link> piwigo </a> </li> <li class=md-nav__item> <a href=../../piwigo/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../piwigo/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../piwigo/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../piwigo/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_28 type=checkbox id=__nav_5_3_28> <label class=md-nav__link for=__nav_5_3_28> Qinglong <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Qinglong data-md-level=3> <label class=md-nav__title for=__nav_5_3_28> <span class="md-nav__icon md-icon"></span> Qinglong </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../qinglong/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../qinglong/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../qinglong/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../qinglong/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../qinglong/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_29 type=checkbox id=__nav_5_3_29> <label class=md-nav__link for=__nav_5_3_29> Redmine <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Redmine data-md-level=3> <label class=md-nav__title for=__nav_5_3_29> <span class="md-nav__icon md-icon"></span> Redmine </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../redmine/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../redmine/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../redmine/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../redmine/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../redmine/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_30 type=checkbox id=__nav_5_3_30> <label class=md-nav__link for=__nav_5_3_30> Rsshub <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Rsshub data-md-level=3> <label class=md-nav__title for=__nav_5_3_30> <span class="md-nav__icon md-icon"></span> Rsshub </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../rsshub/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../rsshub/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../rsshub/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../rsshub/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../rsshub/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_31 type=checkbox id=__nav_5_3_31> <label class=md-nav__link for=__nav_5_3_31> Self service password <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Self service password" data-md-level=3> <label class=md-nav__title for=__nav_5_3_31> <span class="md-nav__icon md-icon"></span> Self service password </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../self-service-password/ class=md-nav__link> self-service-password </a> </li> <li class=md-nav__item> <a href=../../self-service-password/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../self-service-password/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../self-service-password/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../self-service-password/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_32 type=checkbox id=__nav_5_3_32> <label class=md-nav__link for=__nav_5_3_32> Spotweb <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Spotweb data-md-level=3> <label class=md-nav__title for=__nav_5_3_32> <span class="md-nav__icon md-icon"></span> Spotweb </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../spotweb/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../spotweb/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../spotweb/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../spotweb/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../spotweb/security/ class=md-nav__link> Security Overview </a> </li> <li class=md-nav__item> <a href=../../spotweb/validation/ class=md-nav__link> Input Validation </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_33 type=checkbox id=__nav_5_3_33> <label class=md-nav__link for=__nav_5_3_33> Storj node <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Storj node" data-md-level=3> <label class=md-nav__title for=__nav_5_3_33> <span class="md-nav__icon md-icon"></span> Storj node </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../storj-node/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../storj-node/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../storj-node/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../storj-node/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../storj-node/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_34 type=checkbox id=__nav_5_3_34> <label class=md-nav__link for=__nav_5_3_34> Tdarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Tdarr data-md-level=3> <label class=md-nav__title for=__nav_5_3_34> <span class="md-nav__icon md-icon"></span> Tdarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../tdarr/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../tdarr/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../tdarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../tdarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../tdarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_35 type=checkbox id=__nav_5_3_35> <label class=md-nav__link for=__nav_5_3_35> Tdarr node <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Tdarr node" data-md-level=3> <label class=md-nav__title for=__nav_5_3_35> <span class="md-nav__icon md-icon"></span> Tdarr node </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../tdarr-node/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../tdarr-node/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../tdarr-node/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../tdarr-node/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../tdarr-node/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_36 type=checkbox id=__nav_5_3_36> <label class=md-nav__link for=__nav_5_3_36> Technitium <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Technitium data-md-level=3> <label class=md-nav__title for=__nav_5_3_36> <span class="md-nav__icon md-icon"></span> Technitium </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../technitium/ class=md-nav__link> technitium </a> </li> <li class=md-nav__item> <a href=../../technitium/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../technitium/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../technitium/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../technitium/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_37 type=checkbox id=__nav_5_3_37> <label class=md-nav__link for=__nav_5_3_37> Tinymediamanager <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Tinymediamanager data-md-level=3> <label class=md-nav__title for=__nav_5_3_37> <span class="md-nav__icon md-icon"></span> Tinymediamanager </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../tinymediamanager/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../tinymediamanager/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../tinymediamanager/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../tinymediamanager/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../tinymediamanager/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_38 type=checkbox id=__nav_5_3_38> <label class=md-nav__link for=__nav_5_3_38> Verysync <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Verysync data-md-level=3> <label class=md-nav__title for=__nav_5_3_38> <span class="md-nav__icon md-icon"></span> Verysync </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../verysync/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../verysync/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../verysync/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../verysync/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../verysync/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_39 type=checkbox id=__nav_5_3_39> <label class=md-nav__link for=__nav_5_3_39> Wekan <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Wekan data-md-level=3> <label class=md-nav__title for=__nav_5_3_39> <span class="md-nav__icon md-icon"></span> Wekan </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../wekan/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../wekan/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../wekan/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../wekan/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../wekan/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_3_40 type=checkbox id=__nav_5_3_40> <label class=md-nav__link for=__nav_5_3_40> Zerotier <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Zerotier data-md-level=3> <label class=md-nav__title for=__nav_5_3_40> <span class="md-nav__icon md-icon"></span> Zerotier </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../zerotier/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../zerotier/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../zerotier/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../zerotier/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../zerotier/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4 type=checkbox id=__nav_5_4> <label class=md-nav__link for=__nav_5_4> Stable <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Stable data-md-level=2> <label class=md-nav__title for=__nav_5_4> <span class="md-nav__icon md-icon"></span> Stable </label> <ul class=md-nav__list data-md-scrollfix> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_1 type=checkbox id=__nav_5_4_1> <label class=md-nav__link for=__nav_5_4_1> Airdcpp webclient <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Airdcpp webclient" data-md-level=3> <label class=md-nav__title for=__nav_5_4_1> <span class="md-nav__icon md-icon"></span> Airdcpp webclient </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/airdcpp-webclient/ class=md-nav__link> airdcpp-webclient </a> </li> <li class=md-nav__item> <a href=../../../stable/airdcpp-webclient/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/airdcpp-webclient/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/airdcpp-webclient/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/airdcpp-webclient/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_2 type=checkbox id=__nav_5_4_2> <label class=md-nav__link for=__nav_5_4_2> Airsonic <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Airsonic data-md-level=3> <label class=md-nav__title for=__nav_5_4_2> <span class="md-nav__icon md-icon"></span> Airsonic </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/airsonic/ class=md-nav__link> airsonic </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_3 type=checkbox id=__nav_5_4_3> <label class=md-nav__link for=__nav_5_4_3> Airsonic advanced <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Airsonic advanced" data-md-level=3> <label class=md-nav__title for=__nav_5_4_3> <span class="md-nav__icon md-icon"></span> Airsonic advanced </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/airsonic-advanced/ class=md-nav__link> airsonic-advanced </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic-advanced/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic-advanced/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic-advanced/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/airsonic-advanced/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_4 type=checkbox id=__nav_5_4_4> <label class=md-nav__link for=__nav_5_4_4> Alist <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Alist data-md-level=3> <label class=md-nav__title for=__nav_5_4_4> <span class="md-nav__icon md-icon"></span> Alist </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/alist/ class=md-nav__link> alist </a> </li> <li class=md-nav__item> <a href=../../../stable/alist/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/alist/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/alist/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/alist/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_5 type=checkbox id=__nav_5_4_5> <label class=md-nav__link for=__nav_5_4_5> Amcrest2mqtt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Amcrest2mqtt data-md-level=3> <label class=md-nav__title for=__nav_5_4_5> <span class="md-nav__icon md-icon"></span> Amcrest2mqtt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/amcrest2mqtt/ class=md-nav__link> amcrest2mqtt </a> </li> <li class=md-nav__item> <a href=../../../stable/amcrest2mqtt/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/amcrest2mqtt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/amcrest2mqtt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/amcrest2mqtt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_6 type=checkbox id=__nav_5_4_6> <label class=md-nav__link for=__nav_5_4_6> Anonaddy <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Anonaddy data-md-level=3> <label class=md-nav__title for=__nav_5_4_6> <span class="md-nav__icon md-icon"></span> Anonaddy </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/anonaddy/ class=md-nav__link> anonaddy </a> </li> <li class=md-nav__item> <a href=../../../stable/anonaddy/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/anonaddy/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/anonaddy/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/anonaddy/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_7 type=checkbox id=__nav_5_4_7> <label class=md-nav__link for=__nav_5_4_7> Apache musicindex <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Apache musicindex" data-md-level=3> <label class=md-nav__title for=__nav_5_4_7> <span class="md-nav__icon md-icon"></span> Apache musicindex </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/apache-musicindex/ class=md-nav__link> apache-musicindex </a> </li> <li class=md-nav__item> <a href=../../../stable/apache-musicindex/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/apache-musicindex/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/apache-musicindex/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/apache-musicindex/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_8 type=checkbox id=__nav_5_4_8> <label class=md-nav__link for=__nav_5_4_8> Appdaemon <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Appdaemon data-md-level=3> <label class=md-nav__title for=__nav_5_4_8> <span class="md-nav__icon md-icon"></span> Appdaemon </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/appdaemon/ class=md-nav__link> appdaemon </a> </li> <li class=md-nav__item> <a href=../../../stable/appdaemon/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/appdaemon/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/appdaemon/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/appdaemon/security/ class=md-nav__link> Security Overview </a> </li> <li class=md-nav__item> <a href=../../../stable/appdaemon/validation/ class=md-nav__link> Input Validation </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_9 type=checkbox id=__nav_5_4_9> <label class=md-nav__link for=__nav_5_4_9> Aria2 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Aria2 data-md-level=3> <label class=md-nav__title for=__nav_5_4_9> <span class="md-nav__icon md-icon"></span> Aria2 </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/aria2/ class=md-nav__link> aria2 </a> </li> <li class=md-nav__item> <a href=../../../stable/aria2/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/aria2/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/aria2/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/aria2/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_10 type=checkbox id=__nav_5_4_10> <label class=md-nav__link for=__nav_5_4_10> Audacity <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Audacity data-md-level=3> <label class=md-nav__title for=__nav_5_4_10> <span class="md-nav__icon md-icon"></span> Audacity </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/audacity/ class=md-nav__link> audacity </a> </li> <li class=md-nav__item> <a href=../../../stable/audacity/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/audacity/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/audacity/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/audacity/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_11 type=checkbox id=__nav_5_4_11> <label class=md-nav__link for=__nav_5_4_11> Authelia <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Authelia data-md-level=3> <label class=md-nav__title for=__nav_5_4_11> <span class="md-nav__icon md-icon"></span> Authelia </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/authelia/ class=md-nav__link> authelia </a> </li> <li class=md-nav__item> <a href=../../../stable/authelia/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/authelia/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/authelia/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/authelia/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_12 type=checkbox id=__nav_5_4_12> <label class=md-nav__link for=__nav_5_4_12> Avidemux <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Avidemux data-md-level=3> <label class=md-nav__title for=__nav_5_4_12> <span class="md-nav__icon md-icon"></span> Avidemux </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/avidemux/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_13 type=checkbox id=__nav_5_4_13> <label class=md-nav__link for=__nav_5_4_13> Babybuddy <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Babybuddy data-md-level=3> <label class=md-nav__title for=__nav_5_4_13> <span class="md-nav__icon md-icon"></span> Babybuddy </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/babybuddy/ class=md-nav__link> babybuddy </a> </li> <li class=md-nav__item> <a href=../../../stable/babybuddy/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/babybuddy/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/babybuddy/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/babybuddy/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_14 type=checkbox id=__nav_5_4_14> <label class=md-nav__link for=__nav_5_4_14> Bazarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Bazarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_14> <span class="md-nav__icon md-icon"></span> Bazarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/bazarr/ class=md-nav__link> bazarr </a> </li> <li class=md-nav__item> <a href=../../../stable/bazarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/bazarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/bazarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/bazarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_15 type=checkbox id=__nav_5_4_15> <label class=md-nav__link for=__nav_5_4_15> Beets <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Beets data-md-level=3> <label class=md-nav__title for=__nav_5_4_15> <span class="md-nav__icon md-icon"></span> Beets </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/beets/ class=md-nav__link> beets </a> </li> <li class=md-nav__item> <a href=../../../stable/beets/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/beets/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/beets/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/beets/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_16 type=checkbox id=__nav_5_4_16> <label class=md-nav__link for=__nav_5_4_16> Blog <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Blog data-md-level=3> <label class=md-nav__title for=__nav_5_4_16> <span class="md-nav__icon md-icon"></span> Blog </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/blog/ class=md-nav__link> blog </a> </li> <li class=md-nav__item> <a href=../../../stable/blog/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/blog/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/blog/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/blog/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_17 type=checkbox id=__nav_5_4_17> <label class=md-nav__link for=__nav_5_4_17> Boinc <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Boinc data-md-level=3> <label class=md-nav__title for=__nav_5_4_17> <span class="md-nav__icon md-icon"></span> Boinc </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/boinc/ class=md-nav__link> boinc </a> </li> <li class=md-nav__item> <a href=../../../stable/boinc/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/boinc/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/boinc/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/boinc/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_18 type=checkbox id=__nav_5_4_18> <label class=md-nav__link for=__nav_5_4_18> Booksonic air <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Booksonic air" data-md-level=3> <label class=md-nav__title for=__nav_5_4_18> <span class="md-nav__icon md-icon"></span> Booksonic air </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/booksonic-air/ class=md-nav__link> booksonic-air </a> </li> <li class=md-nav__item> <a href=../../../stable/booksonic-air/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/booksonic-air/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/booksonic-air/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/booksonic-air/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_19 type=checkbox id=__nav_5_4_19> <label class=md-nav__link for=__nav_5_4_19> Bookstack <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Bookstack data-md-level=3> <label class=md-nav__title for=__nav_5_4_19> <span class="md-nav__icon md-icon"></span> Bookstack </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/bookstack/ class=md-nav__link> bookstack </a> </li> <li class=md-nav__item> <a href=../../../stable/bookstack/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/bookstack/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/bookstack/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/bookstack/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_20 type=checkbox id=__nav_5_4_20> <label class=md-nav__link for=__nav_5_4_20> Browserless chrome <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Browserless chrome" data-md-level=3> <label class=md-nav__title for=__nav_5_4_20> <span class="md-nav__icon md-icon"></span> Browserless chrome </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/browserless-chrome/ class=md-nav__link> browserless-chrome </a> </li> <li class=md-nav__item> <a href=../../../stable/browserless-chrome/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/browserless-chrome/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/browserless-chrome/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/browserless-chrome/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_21 type=checkbox id=__nav_5_4_21> <label class=md-nav__link for=__nav_5_4_21> Budge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Budge data-md-level=3> <label class=md-nav__title for=__nav_5_4_21> <span class="md-nav__icon md-icon"></span> Budge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/budge/ class=md-nav__link> budge </a> </li> <li class=md-nav__item> <a href=../../../stable/budge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/budge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/budge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/budge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_22 type=checkbox id=__nav_5_4_22> <label class=md-nav__link for=__nav_5_4_22> Calibre <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Calibre data-md-level=3> <label class=md-nav__title for=__nav_5_4_22> <span class="md-nav__icon md-icon"></span> Calibre </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/calibre/ class=md-nav__link> calibre </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_23 type=checkbox id=__nav_5_4_23> <label class=md-nav__link for=__nav_5_4_23> Calibre web <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Calibre web" data-md-level=3> <label class=md-nav__title for=__nav_5_4_23> <span class="md-nav__icon md-icon"></span> Calibre web </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/calibre-web/ class=md-nav__link> calibre-web </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre-web/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre-web/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre-web/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/calibre-web/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_24 type=checkbox id=__nav_5_4_24> <label class=md-nav__link for=__nav_5_4_24> Chevereto <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Chevereto data-md-level=3> <label class=md-nav__title for=__nav_5_4_24> <span class="md-nav__icon md-icon"></span> Chevereto </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/chevereto/ class=md-nav__link> chevereto </a> </li> <li class=md-nav__item> <a href=../../../stable/chevereto/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/chevereto/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/chevereto/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/chevereto/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_25 type=checkbox id=__nav_5_4_25> <label class=md-nav__link for=__nav_5_4_25> Clamav <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Clamav data-md-level=3> <label class=md-nav__title for=__nav_5_4_25> <span class="md-nav__icon md-icon"></span> Clamav </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/clamav/ class=md-nav__link> clamav </a> </li> <li class=md-nav__item> <a href=../../../stable/clamav/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/clamav/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/clamav/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/clamav/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_26 type=checkbox id=__nav_5_4_26> <label class=md-nav__link for=__nav_5_4_26> Clarkson <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Clarkson data-md-level=3> <label class=md-nav__title for=__nav_5_4_26> <span class="md-nav__icon md-icon"></span> Clarkson </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/clarkson/ class=md-nav__link> clarkson </a> </li> <li class=md-nav__item> <a href=../../../stable/clarkson/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/clarkson/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/clarkson/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/clarkson/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_27 type=checkbox id=__nav_5_4_27> <label class=md-nav__link for=__nav_5_4_27> Cloud9 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Cloud9 data-md-level=3> <label class=md-nav__title for=__nav_5_4_27> <span class="md-nav__icon md-icon"></span> Cloud9 </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/cloud9/ class=md-nav__link> cloud9 </a> </li> <li class=md-nav__item> <a href=../../../stable/cloud9/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/cloud9/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/cloud9/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/cloud9/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_28 type=checkbox id=__nav_5_4_28> <label class=md-nav__link for=__nav_5_4_28> Code server <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Code server" data-md-level=3> <label class=md-nav__title for=__nav_5_4_28> <span class="md-nav__icon md-icon"></span> Code server </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/code-server/ class=md-nav__link> code-server </a> </li> <li class=md-nav__item> <a href=../../../stable/code-server/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/code-server/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/code-server/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/code-server/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_29 type=checkbox id=__nav_5_4_29> <label class=md-nav__link for=__nav_5_4_29> Collabora online <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Collabora online" data-md-level=3> <label class=md-nav__title for=__nav_5_4_29> <span class="md-nav__icon md-icon"></span> Collabora online </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/collabora-online/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/collabora-online/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/collabora-online/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/collabora-online/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/collabora-online/notes/ class=md-nav__link> Installation Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/collabora-online/security/ class=md-nav__link> Security Overview </a> </li> <li class=md-nav__item> <a href=../../../stable/collabora-online/validation/ class=md-nav__link> Input Validation </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_30 type=checkbox id=__nav_5_4_30> <label class=md-nav__link for=__nav_5_4_30> Couchpotato <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Couchpotato data-md-level=3> <label class=md-nav__title for=__nav_5_4_30> <span class="md-nav__icon md-icon"></span> Couchpotato </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/couchpotato/ class=md-nav__link> couchpotato </a> </li> <li class=md-nav__item> <a href=../../../stable/couchpotato/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/couchpotato/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/couchpotato/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/couchpotato/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_31 type=checkbox id=__nav_5_4_31> <label class=md-nav__link for=__nav_5_4_31> Cryptofolio <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Cryptofolio data-md-level=3> <label class=md-nav__title for=__nav_5_4_31> <span class="md-nav__icon md-icon"></span> Cryptofolio </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/cryptofolio/ class=md-nav__link> cryptofolio </a> </li> <li class=md-nav__item> <a href=../../../stable/cryptofolio/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/cryptofolio/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/cryptofolio/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/cryptofolio/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_32 type=checkbox id=__nav_5_4_32> <label class=md-nav__link for=__nav_5_4_32> Custom app <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Custom app" data-md-level=3> <label class=md-nav__title for=__nav_5_4_32> <span class="md-nav__icon md-icon"></span> Custom app </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/custom-app/ class=md-nav__link> custom-app </a> </li> <li class=md-nav__item> <a href=../../../stable/custom-app/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/custom-app/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/custom-app/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/custom-app/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_33 type=checkbox id=__nav_5_4_33> <label class=md-nav__link for=__nav_5_4_33> Darktable <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Darktable data-md-level=3> <label class=md-nav__title for=__nav_5_4_33> <span class="md-nav__icon md-icon"></span> Darktable </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/darktable/ class=md-nav__link> darktable </a> </li> <li class=md-nav__item> <a href=../../../stable/darktable/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/darktable/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/darktable/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/darktable/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_34 type=checkbox id=__nav_5_4_34> <label class=md-nav__link for=__nav_5_4_34> Davos <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Davos data-md-level=3> <label class=md-nav__title for=__nav_5_4_34> <span class="md-nav__icon md-icon"></span> Davos </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/davos/ class=md-nav__link> davos </a> </li> <li class=md-nav__item> <a href=../../../stable/davos/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/davos/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/davos/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/davos/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_35 type=checkbox id=__nav_5_4_35> <label class=md-nav__link for=__nav_5_4_35> Ddclient <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ddclient data-md-level=3> <label class=md-nav__title for=__nav_5_4_35> <span class="md-nav__icon md-icon"></span> Ddclient </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ddclient/ class=md-nav__link> ddclient </a> </li> <li class=md-nav__item> <a href=../../../stable/ddclient/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ddclient/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ddclient/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ddclient/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_36 type=checkbox id=__nav_5_4_36> <label class=md-nav__link for=__nav_5_4_36> Ddns go <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Ddns go" data-md-level=3> <label class=md-nav__title for=__nav_5_4_36> <span class="md-nav__icon md-icon"></span> Ddns go </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ddns-go/ class=md-nav__link> ddns-go </a> </li> <li class=md-nav__item> <a href=../../../stable/ddns-go/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ddns-go/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ddns-go/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ddns-go/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_37 type=checkbox id=__nav_5_4_37> <label class=md-nav__link for=__nav_5_4_37> Deconz <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Deconz data-md-level=3> <label class=md-nav__title for=__nav_5_4_37> <span class="md-nav__icon md-icon"></span> Deconz </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/deconz/ class=md-nav__link> deconz </a> </li> <li class=md-nav__item> <a href=../../../stable/deconz/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/deconz/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/deconz/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/deconz/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_38 type=checkbox id=__nav_5_4_38> <label class=md-nav__link for=__nav_5_4_38> Deemix <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Deemix data-md-level=3> <label class=md-nav__title for=__nav_5_4_38> <span class="md-nav__icon md-icon"></span> Deemix </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/deemix/ class=md-nav__link> deemix </a> </li> <li class=md-nav__item> <a href=../../../stable/deemix/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/deemix/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/deemix/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/deemix/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_39 type=checkbox id=__nav_5_4_39> <label class=md-nav__link for=__nav_5_4_39> Deepstack <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Deepstack data-md-level=3> <label class=md-nav__title for=__nav_5_4_39> <span class="md-nav__icon md-icon"></span> Deepstack </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/deepstack/ class=md-nav__link> deepstack </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_40 type=checkbox id=__nav_5_4_40> <label class=md-nav__link for=__nav_5_4_40> Deepstack cpu <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Deepstack cpu" data-md-level=3> <label class=md-nav__title for=__nav_5_4_40> <span class="md-nav__icon md-icon"></span> Deepstack cpu </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/deepstack-cpu/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-cpu/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-cpu/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-cpu/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-cpu/notes/ class=md-nav__link> Installation Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-cpu/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_41 type=checkbox id=__nav_5_4_41> <label class=md-nav__link for=__nav_5_4_41> Deepstack gpu <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Deepstack gpu" data-md-level=3> <label class=md-nav__title for=__nav_5_4_41> <span class="md-nav__icon md-icon"></span> Deepstack gpu </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/deepstack-gpu/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-gpu/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-gpu/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-gpu/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/deepstack-gpu/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_42 type=checkbox id=__nav_5_4_42> <label class=md-nav__link for=__nav_5_4_42> Deluge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Deluge data-md-level=3> <label class=md-nav__title for=__nav_5_4_42> <span class="md-nav__icon md-icon"></span> Deluge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/deluge/ class=md-nav__link> deluge </a> </li> <li class=md-nav__item> <a href=../../../stable/deluge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/deluge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/deluge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/deluge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_43 type=checkbox id=__nav_5_4_43> <label class=md-nav__link for=__nav_5_4_43> Digikam <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Digikam data-md-level=3> <label class=md-nav__title for=__nav_5_4_43> <span class="md-nav__icon md-icon"></span> Digikam </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/digikam/ class=md-nav__link> digikam </a> </li> <li class=md-nav__item> <a href=../../../stable/digikam/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/digikam/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/digikam/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/digikam/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_44 type=checkbox id=__nav_5_4_44> <label class=md-nav__link for=__nav_5_4_44> Dillinger <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Dillinger data-md-level=3> <label class=md-nav__title for=__nav_5_4_44> <span class="md-nav__icon md-icon"></span> Dillinger </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/dillinger/ class=md-nav__link> dillinger </a> </li> <li class=md-nav__item> <a href=../../../stable/dillinger/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/dillinger/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/dillinger/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/dillinger/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_45 type=checkbox id=__nav_5_4_45> <label class=md-nav__link for=__nav_5_4_45> Dizquetv <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Dizquetv data-md-level=3> <label class=md-nav__title for=__nav_5_4_45> <span class="md-nav__icon md-icon"></span> Dizquetv </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/dizquetv/ class=md-nav__link> dizquetv </a> </li> <li class=md-nav__item> <a href=../../../stable/dizquetv/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/dizquetv/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/dizquetv/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/dizquetv/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_46 type=checkbox id=__nav_5_4_46> <label class=md-nav__link for=__nav_5_4_46> Dokuwiki <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Dokuwiki data-md-level=3> <label class=md-nav__title for=__nav_5_4_46> <span class="md-nav__icon md-icon"></span> Dokuwiki </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/dokuwiki/ class=md-nav__link> dokuwiki </a> </li> <li class=md-nav__item> <a href=../../../stable/dokuwiki/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/dokuwiki/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/dokuwiki/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/dokuwiki/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_47 type=checkbox id=__nav_5_4_47> <label class=md-nav__link for=__nav_5_4_47> Domoticz <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Domoticz data-md-level=3> <label class=md-nav__title for=__nav_5_4_47> <span class="md-nav__icon md-icon"></span> Domoticz </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/domoticz/ class=md-nav__link> domoticz </a> </li> <li class=md-nav__item> <a href=../../../stable/domoticz/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/domoticz/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/domoticz/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/domoticz/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_48 type=checkbox id=__nav_5_4_48> <label class=md-nav__link for=__nav_5_4_48> Doplarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Doplarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_48> <span class="md-nav__icon md-icon"></span> Doplarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/doplarr/ class=md-nav__link> doplarr </a> </li> <li class=md-nav__item> <a href=../../../stable/doplarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/doplarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/doplarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/doplarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_49 type=checkbox id=__nav_5_4_49> <label class=md-nav__link for=__nav_5_4_49> Double take <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Double take" data-md-level=3> <label class=md-nav__title for=__nav_5_4_49> <span class="md-nav__icon md-icon"></span> Double take </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/double-take/ class=md-nav__link> double-take </a> </li> <li class=md-nav__item> <a href=../../../stable/double-take/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/double-take/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/double-take/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/double-take/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_50 type=checkbox id=__nav_5_4_50> <label class=md-nav__link for=__nav_5_4_50> Doublecommander <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Doublecommander data-md-level=3> <label class=md-nav__title for=__nav_5_4_50> <span class="md-nav__icon md-icon"></span> Doublecommander </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/doublecommander/ class=md-nav__link> doublecommander </a> </li> <li class=md-nav__item> <a href=../../../stable/doublecommander/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/doublecommander/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/doublecommander/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/doublecommander/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_51 type=checkbox id=__nav_5_4_51> <label class=md-nav__link for=__nav_5_4_51> Dsmr reader <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Dsmr reader" data-md-level=3> <label class=md-nav__title for=__nav_5_4_51> <span class="md-nav__icon md-icon"></span> Dsmr reader </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/dsmr-reader/ class=md-nav__link> dsmr-reader </a> </li> <li class=md-nav__item> <a href=../../../stable/dsmr-reader/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/dsmr-reader/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/dsmr-reader/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/dsmr-reader/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_52 type=checkbox id=__nav_5_4_52> <label class=md-nav__link for=__nav_5_4_52> Duckdns <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Duckdns data-md-level=3> <label class=md-nav__title for=__nav_5_4_52> <span class="md-nav__icon md-icon"></span> Duckdns </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/duckdns/ class=md-nav__link> duckdns </a> </li> <li class=md-nav__item> <a href=../../../stable/duckdns/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/duckdns/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/duckdns/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/duckdns/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_53 type=checkbox id=__nav_5_4_53> <label class=md-nav__link for=__nav_5_4_53> Dupeguru <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Dupeguru data-md-level=3> <label class=md-nav__title for=__nav_5_4_53> <span class="md-nav__icon md-icon"></span> Dupeguru </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/dupeguru/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_54 type=checkbox id=__nav_5_4_54> <label class=md-nav__link for=__nav_5_4_54> Duplicati <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Duplicati data-md-level=3> <label class=md-nav__title for=__nav_5_4_54> <span class="md-nav__icon md-icon"></span> Duplicati </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/duplicati/ class=md-nav__link> duplicati </a> </li> <li class=md-nav__item> <a href=../../../stable/duplicati/Adding-Ingress/ class=md-nav__link> Adding Ingress </a> </li> <li class=md-nav__item> <a href=../../../stable/duplicati/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/duplicati/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/duplicati/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/duplicati/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_55 type=checkbox id=__nav_5_4_55> <label class=md-nav__link for=__nav_5_4_55> Emby <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Emby data-md-level=3> <label class=md-nav__title for=__nav_5_4_55> <span class="md-nav__icon md-icon"></span> Emby </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/emby/ class=md-nav__link> emby </a> </li> <li class=md-nav__item> <a href=../../../stable/emby/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/emby/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/emby/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/emby/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_56 type=checkbox id=__nav_5_4_56> <label class=md-nav__link for=__nav_5_4_56> Embystat <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Embystat data-md-level=3> <label class=md-nav__title for=__nav_5_4_56> <span class="md-nav__icon md-icon"></span> Embystat </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/embystat/ class=md-nav__link> embystat </a> </li> <li class=md-nav__item> <a href=../../../stable/embystat/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/embystat/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/embystat/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/embystat/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_57 type=checkbox id=__nav_5_4_57> <label class=md-nav__link for=__nav_5_4_57> Emulatorjs <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Emulatorjs data-md-level=3> <label class=md-nav__title for=__nav_5_4_57> <span class="md-nav__icon md-icon"></span> Emulatorjs </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/emulatorjs/ class=md-nav__link> emulatorjs </a> </li> <li class=md-nav__item> <a href=../../../stable/emulatorjs/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/emulatorjs/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/emulatorjs/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/emulatorjs/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_58 type=checkbox id=__nav_5_4_58> <label class=md-nav__link for=__nav_5_4_58> Endlessh <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Endlessh data-md-level=3> <label class=md-nav__title for=__nav_5_4_58> <span class="md-nav__icon md-icon"></span> Endlessh </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/endlessh/ class=md-nav__link> endlessh </a> </li> <li class=md-nav__item> <a href=../../../stable/endlessh/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/endlessh/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/endlessh/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/endlessh/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_59 type=checkbox id=__nav_5_4_59> <label class=md-nav__link for=__nav_5_4_59> Esphome <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Esphome data-md-level=3> <label class=md-nav__title for=__nav_5_4_59> <span class="md-nav__icon md-icon"></span> Esphome </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/esphome/ class=md-nav__link> esphome </a> </li> <li class=md-nav__item> <a href=../../../stable/esphome/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/esphome/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/esphome/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/esphome/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_60 type=checkbox id=__nav_5_4_60> <label class=md-nav__link for=__nav_5_4_60> Etherpad <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Etherpad data-md-level=3> <label class=md-nav__title for=__nav_5_4_60> <span class="md-nav__icon md-icon"></span> Etherpad </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/etherpad/ class=md-nav__link> etherpad </a> </li> <li class=md-nav__item> <a href=../../../stable/etherpad/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/etherpad/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/etherpad/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/etherpad/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_61 type=checkbox id=__nav_5_4_61> <label class=md-nav__link for=__nav_5_4_61> Filebot <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Filebot data-md-level=3> <label class=md-nav__title for=__nav_5_4_61> <span class="md-nav__icon md-icon"></span> Filebot </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/filebot/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_62 type=checkbox id=__nav_5_4_62> <label class=md-nav__link for=__nav_5_4_62> Filebrowser <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Filebrowser data-md-level=3> <label class=md-nav__title for=__nav_5_4_62> <span class="md-nav__icon md-icon"></span> Filebrowser </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/filebrowser/ class=md-nav__link> filebrowser </a> </li> <li class=md-nav__item> <a href=../../../stable/filebrowser/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/filebrowser/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/filebrowser/defaultcreds/ class=md-nav__link> Default Username/Password </a> </li> <li class=md-nav__item> <a href=../../../stable/filebrowser/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/filebrowser/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_63 type=checkbox id=__nav_5_4_63> <label class=md-nav__link for=__nav_5_4_63> Filezilla <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Filezilla data-md-level=3> <label class=md-nav__title for=__nav_5_4_63> <span class="md-nav__icon md-icon"></span> Filezilla </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/filezilla/ class=md-nav__link> filezilla </a> </li> <li class=md-nav__item> <a href=../../../stable/filezilla/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/filezilla/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/filezilla/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/filezilla/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_64 type=checkbox id=__nav_5_4_64> <label class=md-nav__link for=__nav_5_4_64> Fireflyiii <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Fireflyiii data-md-level=3> <label class=md-nav__title for=__nav_5_4_64> <span class="md-nav__icon md-icon"></span> Fireflyiii </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/fireflyiii/ class=md-nav__link> fireflyiii </a> </li> <li class=md-nav__item> <a href=../../../stable/fireflyiii/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/fireflyiii/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/fireflyiii/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/fireflyiii/notes/ class=md-nav__link> Important Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/fireflyiii/security/ class=md-nav__link> Security Overview </a> </li> <li class=md-nav__item> <a href=../../../stable/fireflyiii/validation/ class=md-nav__link> Input Validation </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_65 type=checkbox id=__nav_5_4_65> <label class=md-nav__link for=__nav_5_4_65> Firefox <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Firefox data-md-level=3> <label class=md-nav__title for=__nav_5_4_65> <span class="md-nav__icon md-icon"></span> Firefox </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/firefox/ class=md-nav__link> firefox </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_66 type=checkbox id=__nav_5_4_66> <label class=md-nav__link for=__nav_5_4_66> Firefox syncserver <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Firefox syncserver" data-md-level=3> <label class=md-nav__title for=__nav_5_4_66> <span class="md-nav__icon md-icon"></span> Firefox syncserver </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/firefox-syncserver/ class=md-nav__link> firefox-syncserver </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox-syncserver/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox-syncserver/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox-syncserver/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/firefox-syncserver/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_67 type=checkbox id=__nav_5_4_67> <label class=md-nav__link for=__nav_5_4_67> Flaresolverr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Flaresolverr data-md-level=3> <label class=md-nav__title for=__nav_5_4_67> <span class="md-nav__icon md-icon"></span> Flaresolverr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/flaresolverr/ class=md-nav__link> flaresolverr </a> </li> <li class=md-nav__item> <a href=../../../stable/flaresolverr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/flaresolverr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/flaresolverr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/flaresolverr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_68 type=checkbox id=__nav_5_4_68> <label class=md-nav__link for=__nav_5_4_68> Fleet <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Fleet data-md-level=3> <label class=md-nav__title for=__nav_5_4_68> <span class="md-nav__icon md-icon"></span> Fleet </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/fleet/ class=md-nav__link> fleet </a> </li> <li class=md-nav__item> <a href=../../../stable/fleet/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/fleet/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/fleet/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/fleet/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_69 type=checkbox id=__nav_5_4_69> <label class=md-nav__link for=__nav_5_4_69> Flexget <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Flexget data-md-level=3> <label class=md-nav__title for=__nav_5_4_69> <span class="md-nav__icon md-icon"></span> Flexget </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/flexget/ class=md-nav__link> flexget </a> </li> <li class=md-nav__item> <a href=../../../stable/flexget/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/flexget/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/flexget/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/flexget/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_70 type=checkbox id=__nav_5_4_70> <label class=md-nav__link for=__nav_5_4_70> Flood <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Flood data-md-level=3> <label class=md-nav__title for=__nav_5_4_70> <span class="md-nav__icon md-icon"></span> Flood </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/flood/ class=md-nav__link> flood </a> </li> <li class=md-nav__item> <a href=../../../stable/flood/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/flood/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/flood/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/flood/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_71 type=checkbox id=__nav_5_4_71> <label class=md-nav__link for=__nav_5_4_71> Focalboard <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Focalboard data-md-level=3> <label class=md-nav__title for=__nav_5_4_71> <span class="md-nav__icon md-icon"></span> Focalboard </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/focalboard/ class=md-nav__link> focalboard </a> </li> <li class=md-nav__item> <a href=../../../stable/focalboard/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/focalboard/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/focalboard/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/focalboard/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_72 type=checkbox id=__nav_5_4_72> <label class=md-nav__link for=__nav_5_4_72> Foldingathome <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Foldingathome data-md-level=3> <label class=md-nav__title for=__nav_5_4_72> <span class="md-nav__icon md-icon"></span> Foldingathome </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/foldingathome/ class=md-nav__link> foldingathome </a> </li> <li class=md-nav__item> <a href=../../../stable/foldingathome/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/foldingathome/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/foldingathome/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/foldingathome/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_73 type=checkbox id=__nav_5_4_73> <label class=md-nav__link for=__nav_5_4_73> Fossil <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Fossil data-md-level=3> <label class=md-nav__title for=__nav_5_4_73> <span class="md-nav__icon md-icon"></span> Fossil </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/fossil/ class=md-nav__link> fossil </a> </li> <li class=md-nav__item> <a href=../../../stable/fossil/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/fossil/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/fossil/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/fossil/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_74 type=checkbox id=__nav_5_4_74> <label class=md-nav__link for=__nav_5_4_74> Freeradius <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Freeradius data-md-level=3> <label class=md-nav__title for=__nav_5_4_74> <span class="md-nav__icon md-icon"></span> Freeradius </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/freeradius/ class=md-nav__link> freeradius </a> </li> <li class=md-nav__item> <a href=../../../stable/freeradius/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/freeradius/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/freeradius/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/freeradius/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_75 type=checkbox id=__nav_5_4_75> <label class=md-nav__link for=__nav_5_4_75> Freshrss <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Freshrss data-md-level=3> <label class=md-nav__title for=__nav_5_4_75> <span class="md-nav__icon md-icon"></span> Freshrss </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/freshrss/ class=md-nav__link> freshrss </a> </li> <li class=md-nav__item> <a href=../../../stable/freshrss/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/freshrss/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/freshrss/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/freshrss/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_76 type=checkbox id=__nav_5_4_76> <label class=md-nav__link for=__nav_5_4_76> Friendica <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Friendica data-md-level=3> <label class=md-nav__title for=__nav_5_4_76> <span class="md-nav__icon md-icon"></span> Friendica </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/friendica/ class=md-nav__link> friendica </a> </li> <li class=md-nav__item> <a href=../../../stable/friendica/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/friendica/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/friendica/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/friendica/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_77 type=checkbox id=__nav_5_4_77> <label class=md-nav__link for=__nav_5_4_77> Gaps <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Gaps data-md-level=3> <label class=md-nav__title for=__nav_5_4_77> <span class="md-nav__icon md-icon"></span> Gaps </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/gaps/ class=md-nav__link> gaps </a> </li> <li class=md-nav__item> <a href=../../../stable/gaps/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/gaps/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/gaps/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/gaps/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_78 type=checkbox id=__nav_5_4_78> <label class=md-nav__link for=__nav_5_4_78> Ghost <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ghost data-md-level=3> <label class=md-nav__title for=__nav_5_4_78> <span class="md-nav__icon md-icon"></span> Ghost </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ghost/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/ghost/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/ghost/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ghost/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ghost/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_79 type=checkbox id=__nav_5_4_79> <label class=md-nav__link for=__nav_5_4_79> Gitea <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Gitea data-md-level=3> <label class=md-nav__title for=__nav_5_4_79> <span class="md-nav__icon md-icon"></span> Gitea </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/gitea/ class=md-nav__link> gitea </a> </li> <li class=md-nav__item> <a href=../../../stable/gitea/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/gitea/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/gitea/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/gitea/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_80 type=checkbox id=__nav_5_4_80> <label class=md-nav__link for=__nav_5_4_80> Golinks <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Golinks data-md-level=3> <label class=md-nav__title for=__nav_5_4_80> <span class="md-nav__icon md-icon"></span> Golinks </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/golinks/ class=md-nav__link> golinks </a> </li> <li class=md-nav__item> <a href=../../../stable/golinks/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/golinks/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/golinks/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/golinks/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_81 type=checkbox id=__nav_5_4_81> <label class=md-nav__link for=__nav_5_4_81> Gonic <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Gonic data-md-level=3> <label class=md-nav__title for=__nav_5_4_81> <span class="md-nav__icon md-icon"></span> Gonic </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/gonic/ class=md-nav__link> gonic </a> </li> <li class=md-nav__item> <a href=../../../stable/gonic/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/gonic/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/gonic/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/gonic/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_82 type=checkbox id=__nav_5_4_82> <label class=md-nav__link for=__nav_5_4_82> Gotify <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Gotify data-md-level=3> <label class=md-nav__title for=__nav_5_4_82> <span class="md-nav__icon md-icon"></span> Gotify </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/gotify/ class=md-nav__link> gotify </a> </li> <li class=md-nav__item> <a href=../../../stable/gotify/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/gotify/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/gotify/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/gotify/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_83 type=checkbox id=__nav_5_4_83> <label class=md-nav__link for=__nav_5_4_83> Grafana <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Grafana data-md-level=3> <label class=md-nav__title for=__nav_5_4_83> <span class="md-nav__icon md-icon"></span> Grafana </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/grafana/ class=md-nav__link> grafana </a> </li> <li class=md-nav__item> <a href=../../../stable/grafana/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/grafana/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/grafana/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/grafana/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_84 type=checkbox id=__nav_5_4_84> <label class=md-nav__link for=__nav_5_4_84> Grav <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Grav data-md-level=3> <label class=md-nav__title for=__nav_5_4_84> <span class="md-nav__icon md-icon"></span> Grav </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/grav/ class=md-nav__link> grav </a> </li> <li class=md-nav__item> <a href=../../../stable/grav/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/grav/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/grav/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/grav/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_85 type=checkbox id=__nav_5_4_85> <label class=md-nav__link for=__nav_5_4_85> Grist <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Grist data-md-level=3> <label class=md-nav__title for=__nav_5_4_85> <span class="md-nav__icon md-icon"></span> Grist </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/grist/ class=md-nav__link> grist </a> </li> <li class=md-nav__item> <a href=../../../stable/grist/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/grist/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/grist/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/grist/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_86 type=checkbox id=__nav_5_4_86> <label class=md-nav__link for=__nav_5_4_86> Grocy <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Grocy data-md-level=3> <label class=md-nav__title for=__nav_5_4_86> <span class="md-nav__icon md-icon"></span> Grocy </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/grocy/ class=md-nav__link> grocy </a> </li> <li class=md-nav__item> <a href=../../../stable/grocy/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/grocy/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/grocy/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/grocy/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_87 type=checkbox id=__nav_5_4_87> <label class=md-nav__link for=__nav_5_4_87> Guacamole client <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Guacamole client" data-md-level=3> <label class=md-nav__title for=__nav_5_4_87> <span class="md-nav__icon md-icon"></span> Guacamole client </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/guacamole-client/ class=md-nav__link> guacamole-client </a> </li> <li class=md-nav__item> <a href=../../../stable/guacamole-client/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/guacamole-client/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/guacamole-client/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/guacamole-client/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_88 type=checkbox id=__nav_5_4_88> <label class=md-nav__link for=__nav_5_4_88> Guacd <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Guacd data-md-level=3> <label class=md-nav__title for=__nav_5_4_88> <span class="md-nav__icon md-icon"></span> Guacd </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/guacd/ class=md-nav__link> guacd </a> </li> <li class=md-nav__item> <a href=../../../stable/guacd/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/guacd/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/guacd/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/guacd/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_89 type=checkbox id=__nav_5_4_89> <label class=md-nav__link for=__nav_5_4_89> Habridge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Habridge data-md-level=3> <label class=md-nav__title for=__nav_5_4_89> <span class="md-nav__icon md-icon"></span> Habridge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/habridge/ class=md-nav__link> habridge </a> </li> <li class=md-nav__item> <a href=../../../stable/habridge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/habridge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/habridge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/habridge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_90 type=checkbox id=__nav_5_4_90> <label class=md-nav__link for=__nav_5_4_90> Hammond <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Hammond data-md-level=3> <label class=md-nav__title for=__nav_5_4_90> <span class="md-nav__icon md-icon"></span> Hammond </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/hammond/ class=md-nav__link> hammond </a> </li> <li class=md-nav__item> <a href=../../../stable/hammond/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/hammond/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/hammond/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/hammond/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_91 type=checkbox id=__nav_5_4_91> <label class=md-nav__link for=__nav_5_4_91> Handbrake <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Handbrake data-md-level=3> <label class=md-nav__title for=__nav_5_4_91> <span class="md-nav__icon md-icon"></span> Handbrake </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/handbrake/ class=md-nav__link> handbrake </a> </li> <li class=md-nav__item> <a href=../../../stable/handbrake/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/handbrake/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/handbrake/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/handbrake/notes/ class=md-nav__link> Installation Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/handbrake/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_92 type=checkbox id=__nav_5_4_92> <label class=md-nav__link for=__nav_5_4_92> Haste server <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Haste server" data-md-level=3> <label class=md-nav__title for=__nav_5_4_92> <span class="md-nav__icon md-icon"></span> Haste server </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/haste-server/ class=md-nav__link> haste-server </a> </li> <li class=md-nav__item> <a href=../../../stable/haste-server/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/haste-server/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/haste-server/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/haste-server/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_93 type=checkbox id=__nav_5_4_93> <label class=md-nav__link for=__nav_5_4_93> Headphones <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Headphones data-md-level=3> <label class=md-nav__title for=__nav_5_4_93> <span class="md-nav__icon md-icon"></span> Headphones </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/headphones/ class=md-nav__link> headphones </a> </li> <li class=md-nav__item> <a href=../../../stable/headphones/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/headphones/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/headphones/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/headphones/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_94 type=checkbox id=__nav_5_4_94> <label class=md-nav__link for=__nav_5_4_94> Healthchecks <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Healthchecks data-md-level=3> <label class=md-nav__title for=__nav_5_4_94> <span class="md-nav__icon md-icon"></span> Healthchecks </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/healthchecks/ class=md-nav__link> healthchecks </a> </li> <li class=md-nav__item> <a href=../../../stable/healthchecks/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/healthchecks/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/healthchecks/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/healthchecks/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_95 type=checkbox id=__nav_5_4_95> <label class=md-nav__link for=__nav_5_4_95> Hedgedoc <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Hedgedoc data-md-level=3> <label class=md-nav__title for=__nav_5_4_95> <span class="md-nav__icon md-icon"></span> Hedgedoc </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/hedgedoc/ class=md-nav__link> hedgedoc </a> </li> <li class=md-nav__item> <a href=../../../stable/hedgedoc/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/hedgedoc/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/hedgedoc/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/hedgedoc/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_96 type=checkbox id=__nav_5_4_96> <label class=md-nav__link for=__nav_5_4_96> Heimdall <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Heimdall data-md-level=3> <label class=md-nav__title for=__nav_5_4_96> <span class="md-nav__icon md-icon"></span> Heimdall </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/heimdall/ class=md-nav__link> heimdall </a> </li> <li class=md-nav__item> <a href=../../../stable/heimdall/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/heimdall/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/heimdall/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/heimdall/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_97 type=checkbox id=__nav_5_4_97> <label class=md-nav__link for=__nav_5_4_97> Home assistant <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Home assistant" data-md-level=3> <label class=md-nav__title for=__nav_5_4_97> <span class="md-nav__icon md-icon"></span> Home assistant </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/home-assistant/ class=md-nav__link> home-assistant </a> </li> <li class=md-nav__item> <a href=../../../stable/home-assistant/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/home-assistant/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/home-assistant/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/home-assistant/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_98 type=checkbox id=__nav_5_4_98> <label class=md-nav__link for=__nav_5_4_98> Homer <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Homer data-md-level=3> <label class=md-nav__title for=__nav_5_4_98> <span class="md-nav__icon md-icon"></span> Homer </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/homer/ class=md-nav__link> homer </a> </li> <li class=md-nav__item> <a href=../../../stable/homer/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/homer/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/homer/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/homer/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_99 type=checkbox id=__nav_5_4_99> <label class=md-nav__link for=__nav_5_4_99> Htpcmanager <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Htpcmanager data-md-level=3> <label class=md-nav__title for=__nav_5_4_99> <span class="md-nav__icon md-icon"></span> Htpcmanager </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/htpcmanager/ class=md-nav__link> htpcmanager </a> </li> <li class=md-nav__item> <a href=../../../stable/htpcmanager/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/htpcmanager/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/htpcmanager/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/htpcmanager/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_100 type=checkbox id=__nav_5_4_100> <label class=md-nav__link for=__nav_5_4_100> Hyperion ng <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Hyperion ng" data-md-level=3> <label class=md-nav__title for=__nav_5_4_100> <span class="md-nav__icon md-icon"></span> Hyperion ng </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/hyperion-ng/ class=md-nav__link> hyperion-ng </a> </li> <li class=md-nav__item> <a href=../../../stable/hyperion-ng/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/hyperion-ng/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/hyperion-ng/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/hyperion-ng/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_101 type=checkbox id=__nav_5_4_101> <label class=md-nav__link for=__nav_5_4_101> Icantbelieveitsnotvaletudo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Icantbelieveitsnotvaletudo data-md-level=3> <label class=md-nav__title for=__nav_5_4_101> <span class="md-nav__icon md-icon"></span> Icantbelieveitsnotvaletudo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/icantbelieveitsnotvaletudo/ class=md-nav__link> icantbelieveitsnotvaletudo </a> </li> <li class=md-nav__item> <a href=../../../stable/icantbelieveitsnotvaletudo/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/icantbelieveitsnotvaletudo/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/icantbelieveitsnotvaletudo/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/icantbelieveitsnotvaletudo/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_102 type=checkbox id=__nav_5_4_102> <label class=md-nav__link for=__nav_5_4_102> Icinga2 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Icinga2 data-md-level=3> <label class=md-nav__title for=__nav_5_4_102> <span class="md-nav__icon md-icon"></span> Icinga2 </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/icinga2/ class=md-nav__link> icinga2 </a> </li> <li class=md-nav__item> <a href=../../../stable/icinga2/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/icinga2/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/icinga2/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/icinga2/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_103 type=checkbox id=__nav_5_4_103> <label class=md-nav__link for=__nav_5_4_103> Ipfs <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ipfs data-md-level=3> <label class=md-nav__title for=__nav_5_4_103> <span class="md-nav__icon md-icon"></span> Ipfs </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ipfs/ class=md-nav__link> ipfs </a> </li> <li class=md-nav__item> <a href=../../../stable/ipfs/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ipfs/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ipfs/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ipfs/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_104 type=checkbox id=__nav_5_4_104> <label class=md-nav__link for=__nav_5_4_104> Ispy agent dvr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Ispy agent dvr" data-md-level=3> <label class=md-nav__title for=__nav_5_4_104> <span class="md-nav__icon md-icon"></span> Ispy agent dvr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ispy-agent-dvr/ class=md-nav__link> ispy-agent-dvr </a> </li> <li class=md-nav__item> <a href=../../../stable/ispy-agent-dvr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ispy-agent-dvr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ispy-agent-dvr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ispy-agent-dvr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_105 type=checkbox id=__nav_5_4_105> <label class=md-nav__link for=__nav_5_4_105> Iyuuplus <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Iyuuplus data-md-level=3> <label class=md-nav__title for=__nav_5_4_105> <span class="md-nav__icon md-icon"></span> Iyuuplus </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/iyuuplus/ class=md-nav__link> iyuuplus </a> </li> <li class=md-nav__item> <a href=../../../stable/iyuuplus/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/iyuuplus/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/iyuuplus/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/iyuuplus/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_106 type=checkbox id=__nav_5_4_106> <label class=md-nav__link for=__nav_5_4_106> Jackett <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Jackett data-md-level=3> <label class=md-nav__title for=__nav_5_4_106> <span class="md-nav__icon md-icon"></span> Jackett </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/jackett/ class=md-nav__link> jackett </a> </li> <li class=md-nav__item> <a href=../../../stable/jackett/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/jackett/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/jackett/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/jackett/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_107 type=checkbox id=__nav_5_4_107> <label class=md-nav__link for=__nav_5_4_107> Jdownloader2 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Jdownloader2 data-md-level=3> <label class=md-nav__title for=__nav_5_4_107> <span class="md-nav__icon md-icon"></span> Jdownloader2 </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/jdownloader2/ class=md-nav__link> jdownloader2 </a> </li> <li class=md-nav__item> <a href=../../../stable/jdownloader2/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/jdownloader2/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/jdownloader2/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/jdownloader2/notes/ class=md-nav__link> Installation Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/jdownloader2/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_108 type=checkbox id=__nav_5_4_108> <label class=md-nav__link for=__nav_5_4_108> Jellyfin <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Jellyfin data-md-level=3> <label class=md-nav__title for=__nav_5_4_108> <span class="md-nav__icon md-icon"></span> Jellyfin </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/jellyfin/ class=md-nav__link> jellyfin </a> </li> <li class=md-nav__item> <a href=../../../stable/jellyfin/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/jellyfin/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/jellyfin/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/jellyfin/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_109 type=checkbox id=__nav_5_4_109> <label class=md-nav__link for=__nav_5_4_109> Joplin server <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Joplin server" data-md-level=3> <label class=md-nav__title for=__nav_5_4_109> <span class="md-nav__icon md-icon"></span> Joplin server </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/joplin-server/ class=md-nav__link> joplin-server </a> </li> <li class=md-nav__item> <a href=../../../stable/joplin-server/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/joplin-server/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/joplin-server/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/joplin-server/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_110 type=checkbox id=__nav_5_4_110> <label class=md-nav__link for=__nav_5_4_110> Kanboard <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kanboard data-md-level=3> <label class=md-nav__title for=__nav_5_4_110> <span class="md-nav__icon md-icon"></span> Kanboard </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/kanboard/ class=md-nav__link> kanboard </a> </li> <li class=md-nav__item> <a href=../../../stable/kanboard/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/kanboard/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/kanboard/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/kanboard/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_111 type=checkbox id=__nav_5_4_111> <label class=md-nav__link for=__nav_5_4_111> Kavita <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kavita data-md-level=3> <label class=md-nav__title for=__nav_5_4_111> <span class="md-nav__icon md-icon"></span> Kavita </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/kavita/ class=md-nav__link> kavita </a> </li> <li class=md-nav__item> <a href=../../../stable/kavita/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/kavita/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/kavita/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/kavita/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_112 type=checkbox id=__nav_5_4_112> <label class=md-nav__link for=__nav_5_4_112> Kimai <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kimai data-md-level=3> <label class=md-nav__title for=__nav_5_4_112> <span class="md-nav__icon md-icon"></span> Kimai </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/kimai/ class=md-nav__link> kimai </a> </li> <li class=md-nav__item> <a href=../../../stable/kimai/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/kimai/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/kimai/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/kimai/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_113 type=checkbox id=__nav_5_4_113> <label class=md-nav__link for=__nav_5_4_113> Kms <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kms data-md-level=3> <label class=md-nav__title for=__nav_5_4_113> <span class="md-nav__icon md-icon"></span> Kms </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/kms/ class=md-nav__link> kms </a> </li> <li class=md-nav__item> <a href=../../../stable/kms/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/kms/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/kms/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/kms/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_114 type=checkbox id=__nav_5_4_114> <label class=md-nav__link for=__nav_5_4_114> Kodi headless <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Kodi headless" data-md-level=3> <label class=md-nav__title for=__nav_5_4_114> <span class="md-nav__icon md-icon"></span> Kodi headless </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/kodi-headless/ class=md-nav__link> kodi-headless </a> </li> <li class=md-nav__item> <a href=../../../stable/kodi-headless/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/kodi-headless/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/kodi-headless/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/kodi-headless/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_115 type=checkbox id=__nav_5_4_115> <label class=md-nav__link for=__nav_5_4_115> Koel <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Koel data-md-level=3> <label class=md-nav__title for=__nav_5_4_115> <span class="md-nav__icon md-icon"></span> Koel </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/koel/ class=md-nav__link> koel </a> </li> <li class=md-nav__item> <a href=../../../stable/koel/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/koel/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/koel/defaultcreds/ class=md-nav__link> Default Username/Password </a> </li> <li class=md-nav__item> <a href=../../../stable/koel/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/koel/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_116 type=checkbox id=__nav_5_4_116> <label class=md-nav__link for=__nav_5_4_116> Komga <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Komga data-md-level=3> <label class=md-nav__title for=__nav_5_4_116> <span class="md-nav__icon md-icon"></span> Komga </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/komga/ class=md-nav__link> komga </a> </li> <li class=md-nav__item> <a href=../../../stable/komga/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/komga/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/komga/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/komga/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_117 type=checkbox id=__nav_5_4_117> <label class=md-nav__link for=__nav_5_4_117> Kutt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Kutt data-md-level=3> <label class=md-nav__title for=__nav_5_4_117> <span class="md-nav__icon md-icon"></span> Kutt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/kutt/ class=md-nav__link> kutt </a> </li> <li class=md-nav__item> <a href=../../../stable/kutt/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/kutt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/kutt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/kutt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_118 type=checkbox id=__nav_5_4_118> <label class=md-nav__link for=__nav_5_4_118> Lanraragi <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Lanraragi data-md-level=3> <label class=md-nav__title for=__nav_5_4_118> <span class="md-nav__icon md-icon"></span> Lanraragi </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/lanraragi/ class=md-nav__link> lanraragi </a> </li> <li class=md-nav__item> <a href=../../../stable/lanraragi/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/lanraragi/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/lanraragi/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/lanraragi/notes/ class=md-nav__link> Default Password </a> </li> <li class=md-nav__item> <a href=../../../stable/lanraragi/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_119 type=checkbox id=__nav_5_4_119> <label class=md-nav__link for=__nav_5_4_119> Lazylibrarian <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Lazylibrarian data-md-level=3> <label class=md-nav__title for=__nav_5_4_119> <span class="md-nav__icon md-icon"></span> Lazylibrarian </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/lazylibrarian/ class=md-nav__link> lazylibrarian </a> </li> <li class=md-nav__item> <a href=../../../stable/lazylibrarian/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/lazylibrarian/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/lazylibrarian/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/lazylibrarian/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_120 type=checkbox id=__nav_5_4_120> <label class=md-nav__link for=__nav_5_4_120> Leaf2mqtt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Leaf2mqtt data-md-level=3> <label class=md-nav__title for=__nav_5_4_120> <span class="md-nav__icon md-icon"></span> Leaf2mqtt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/leaf2mqtt/ class=md-nav__link> leaf2mqtt </a> </li> <li class=md-nav__item> <a href=../../../stable/leaf2mqtt/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/leaf2mqtt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/leaf2mqtt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/leaf2mqtt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_121 type=checkbox id=__nav_5_4_121> <label class=md-nav__link for=__nav_5_4_121> Leantime <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Leantime data-md-level=3> <label class=md-nav__title for=__nav_5_4_121> <span class="md-nav__icon md-icon"></span> Leantime </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/leantime/ class=md-nav__link> leantime </a> </li> <li class=md-nav__item> <a href=../../../stable/leantime/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/leantime/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/leantime/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/leantime/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_122 type=checkbox id=__nav_5_4_122> <label class=md-nav__link for=__nav_5_4_122> Libreoffice <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Libreoffice data-md-level=3> <label class=md-nav__title for=__nav_5_4_122> <span class="md-nav__icon md-icon"></span> Libreoffice </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/libreoffice/ class=md-nav__link> libreoffice </a> </li> <li class=md-nav__item> <a href=../../../stable/libreoffice/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/libreoffice/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/libreoffice/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/libreoffice/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_123 type=checkbox id=__nav_5_4_123> <label class=md-nav__link for=__nav_5_4_123> Librephotos <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Librephotos data-md-level=3> <label class=md-nav__title for=__nav_5_4_123> <span class="md-nav__icon md-icon"></span> Librephotos </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/librephotos/ class=md-nav__link> librephotos </a> </li> <li class=md-nav__item> <a href=../../../stable/librephotos/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/librephotos/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/librephotos/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/librephotos/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_124 type=checkbox id=__nav_5_4_124> <label class=md-nav__link for=__nav_5_4_124> Librespeed <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Librespeed data-md-level=3> <label class=md-nav__title for=__nav_5_4_124> <span class="md-nav__icon md-icon"></span> Librespeed </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/librespeed/ class=md-nav__link> librespeed </a> </li> <li class=md-nav__item> <a href=../../../stable/librespeed/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/librespeed/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/librespeed/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/librespeed/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_125 type=checkbox id=__nav_5_4_125> <label class=md-nav__link for=__nav_5_4_125> Lidarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Lidarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_125> <span class="md-nav__icon md-icon"></span> Lidarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/lidarr/ class=md-nav__link> lidarr </a> </li> <li class=md-nav__item> <a href=../../../stable/lidarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/lidarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/lidarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/lidarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_126 type=checkbox id=__nav_5_4_126> <label class=md-nav__link for=__nav_5_4_126> Linkace <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Linkace data-md-level=3> <label class=md-nav__title for=__nav_5_4_126> <span class="md-nav__icon md-icon"></span> Linkace </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/linkace/ class=md-nav__link> linkace </a> </li> <li class=md-nav__item> <a href=../../../stable/linkace/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/linkace/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/linkace/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/linkace/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_127 type=checkbox id=__nav_5_4_127> <label class=md-nav__link for=__nav_5_4_127> Littlelink <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Littlelink data-md-level=3> <label class=md-nav__title for=__nav_5_4_127> <span class="md-nav__icon md-icon"></span> Littlelink </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/littlelink/ class=md-nav__link> littlelink </a> </li> <li class=md-nav__item> <a href=../../../stable/littlelink/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/littlelink/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/littlelink/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/littlelink/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_128 type=checkbox id=__nav_5_4_128> <label class=md-nav__link for=__nav_5_4_128> Logitech media server <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Logitech media server" data-md-level=3> <label class=md-nav__title for=__nav_5_4_128> <span class="md-nav__icon md-icon"></span> Logitech media server </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/logitech-media-server/ class=md-nav__link> logitech-media-server </a> </li> <li class=md-nav__item> <a href=../../../stable/logitech-media-server/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/logitech-media-server/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/logitech-media-server/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/logitech-media-server/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_129 type=checkbox id=__nav_5_4_129> <label class=md-nav__link for=__nav_5_4_129> Loki <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Loki data-md-level=3> <label class=md-nav__title for=__nav_5_4_129> <span class="md-nav__icon md-icon"></span> Loki </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/loki/ class=md-nav__link> loki </a> </li> <li class=md-nav__item> <a href=../../../stable/loki/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/loki/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/loki/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/loki/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_130 type=checkbox id=__nav_5_4_130> <label class=md-nav__link for=__nav_5_4_130> Lychee <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Lychee data-md-level=3> <label class=md-nav__title for=__nav_5_4_130> <span class="md-nav__icon md-icon"></span> Lychee </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/lychee/ class=md-nav__link> lychee </a> </li> <li class=md-nav__item> <a href=../../../stable/lychee/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/lychee/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/lychee/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/lychee/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_131 type=checkbox id=__nav_5_4_131> <label class=md-nav__link for=__nav_5_4_131> Makemkv <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Makemkv data-md-level=3> <label class=md-nav__title for=__nav_5_4_131> <span class="md-nav__icon md-icon"></span> Makemkv </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/makemkv/ class=md-nav__link> makemkv </a> </li> <li class=md-nav__item> <a href=../../../stable/makemkv/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/makemkv/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/makemkv/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/makemkv/notes/ class=md-nav__link> Installation Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/makemkv/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_132 type=checkbox id=__nav_5_4_132> <label class=md-nav__link for=__nav_5_4_132> Matomo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Matomo data-md-level=3> <label class=md-nav__title for=__nav_5_4_132> <span class="md-nav__icon md-icon"></span> Matomo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/matomo/ class=md-nav__link> matomo </a> </li> <li class=md-nav__item> <a href=../../../stable/matomo/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/matomo/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/matomo/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/matomo/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_133 type=checkbox id=__nav_5_4_133> <label class=md-nav__link for=__nav_5_4_133> Mealie <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mealie data-md-level=3> <label class=md-nav__title for=__nav_5_4_133> <span class="md-nav__icon md-icon"></span> Mealie </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mealie/ class=md-nav__link> mealie </a> </li> <li class=md-nav__item> <a href=../../../stable/mealie/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/mealie/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/mealie/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/mealie/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_134 type=checkbox id=__nav_5_4_134> <label class=md-nav__link for=__nav_5_4_134> Mediainfo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mediainfo data-md-level=3> <label class=md-nav__title for=__nav_5_4_134> <span class="md-nav__icon md-icon"></span> Mediainfo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mediainfo/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_135 type=checkbox id=__nav_5_4_135> <label class=md-nav__link for=__nav_5_4_135> Medusa <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Medusa data-md-level=3> <label class=md-nav__title for=__nav_5_4_135> <span class="md-nav__icon md-icon"></span> Medusa </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/medusa/ class=md-nav__link> medusa </a> </li> <li class=md-nav__item> <a href=../../../stable/medusa/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/medusa/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/medusa/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/medusa/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_136 type=checkbox id=__nav_5_4_136> <label class=md-nav__link for=__nav_5_4_136> Meshroom <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Meshroom data-md-level=3> <label class=md-nav__title for=__nav_5_4_136> <span class="md-nav__icon md-icon"></span> Meshroom </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/meshroom/ class=md-nav__link> meshroom </a> </li> <li class=md-nav__item> <a href=../../../stable/meshroom/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/meshroom/notes/ class=md-nav__link> Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/meshroom/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_137 type=checkbox id=__nav_5_4_137> <label class=md-nav__link for=__nav_5_4_137> Minetest <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Minetest data-md-level=3> <label class=md-nav__title for=__nav_5_4_137> <span class="md-nav__icon md-icon"></span> Minetest </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/minetest/ class=md-nav__link> minetest </a> </li> <li class=md-nav__item> <a href=../../../stable/minetest/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/minetest/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/minetest/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/minetest/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_138 type=checkbox id=__nav_5_4_138> <label class=md-nav__link for=__nav_5_4_138> Miniflux <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Miniflux data-md-level=3> <label class=md-nav__title for=__nav_5_4_138> <span class="md-nav__icon md-icon"></span> Miniflux </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/miniflux/ class=md-nav__link> miniflux </a> </li> <li class=md-nav__item> <a href=../../../stable/miniflux/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/miniflux/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/miniflux/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/miniflux/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_139 type=checkbox id=__nav_5_4_139> <label class=md-nav__link for=__nav_5_4_139> Minio <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Minio data-md-level=3> <label class=md-nav__title for=__nav_5_4_139> <span class="md-nav__icon md-icon"></span> Minio </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/minio/ class=md-nav__link> minio </a> </li> <li class=md-nav__item> <a href=../../../stable/minio/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/minio/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/minio/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/minio/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_140 type=checkbox id=__nav_5_4_140> <label class=md-nav__link for=__nav_5_4_140> Minio console <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Minio console" data-md-level=3> <label class=md-nav__title for=__nav_5_4_140> <span class="md-nav__icon md-icon"></span> Minio console </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/minio-console/ class=md-nav__link> minio-console </a> </li> <li class=md-nav__item> <a href=../../../stable/minio-console/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/minio-console/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/minio-console/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/minio-console/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_141 type=checkbox id=__nav_5_4_141> <label class=md-nav__link for=__nav_5_4_141> Minisatip <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Minisatip data-md-level=3> <label class=md-nav__title for=__nav_5_4_141> <span class="md-nav__icon md-icon"></span> Minisatip </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/minisatip/ class=md-nav__link> minisatip </a> </li> <li class=md-nav__item> <a href=../../../stable/minisatip/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/minisatip/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/minisatip/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/minisatip/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_142 type=checkbox id=__nav_5_4_142> <label class=md-nav__link for=__nav_5_4_142> Mkvcleaver <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mkvcleaver data-md-level=3> <label class=md-nav__title for=__nav_5_4_142> <span class="md-nav__icon md-icon"></span> Mkvcleaver </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mkvcleaver/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_143 type=checkbox id=__nav_5_4_143> <label class=md-nav__link for=__nav_5_4_143> Ml workspace <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Ml workspace" data-md-level=3> <label class=md-nav__title for=__nav_5_4_143> <span class="md-nav__icon md-icon"></span> Ml workspace </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ml-workspace/ class=md-nav__link> ml-workspace </a> </li> <li class=md-nav__item> <a href=../../../stable/ml-workspace/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ml-workspace/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ml-workspace/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ml-workspace/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_144 type=checkbox id=__nav_5_4_144> <label class=md-nav__link for=__nav_5_4_144> Monica <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Monica data-md-level=3> <label class=md-nav__title for=__nav_5_4_144> <span class="md-nav__icon md-icon"></span> Monica </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/monica/ class=md-nav__link> monica </a> </li> <li class=md-nav__item> <a href=../../../stable/monica/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/monica/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/monica/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/monica/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_145 type=checkbox id=__nav_5_4_145> <label class=md-nav__link for=__nav_5_4_145> Mosquitto <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mosquitto data-md-level=3> <label class=md-nav__title for=__nav_5_4_145> <span class="md-nav__icon md-icon"></span> Mosquitto </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mosquitto/ class=md-nav__link> mosquitto </a> </li> <li class=md-nav__item> <a href=../../../stable/mosquitto/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/mosquitto/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/mosquitto/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/mosquitto/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_146 type=checkbox id=__nav_5_4_146> <label class=md-nav__link for=__nav_5_4_146> Mstream <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mstream data-md-level=3> <label class=md-nav__title for=__nav_5_4_146> <span class="md-nav__icon md-icon"></span> Mstream </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mstream/ class=md-nav__link> mstream </a> </li> <li class=md-nav__item> <a href=../../../stable/mstream/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/mstream/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/mstream/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/mstream/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_147 type=checkbox id=__nav_5_4_147> <label class=md-nav__link for=__nav_5_4_147> Muximux <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Muximux data-md-level=3> <label class=md-nav__title for=__nav_5_4_147> <span class="md-nav__icon md-icon"></span> Muximux </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/muximux/ class=md-nav__link> muximux </a> </li> <li class=md-nav__item> <a href=../../../stable/muximux/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/muximux/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/muximux/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/muximux/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_148 type=checkbox id=__nav_5_4_148> <label class=md-nav__link for=__nav_5_4_148> Mylar <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Mylar data-md-level=3> <label class=md-nav__title for=__nav_5_4_148> <span class="md-nav__icon md-icon"></span> Mylar </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mylar/ class=md-nav__link> mylar </a> </li> <li class=md-nav__item> <a href=../../../stable/mylar/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/mylar/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/mylar/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/mylar/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_149 type=checkbox id=__nav_5_4_149> <label class=md-nav__link for=__nav_5_4_149> Mysql workbench <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Mysql workbench" data-md-level=3> <label class=md-nav__title for=__nav_5_4_149> <span class="md-nav__icon md-icon"></span> Mysql workbench </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/mysql-workbench/ class=md-nav__link> mysql-workbench </a> </li> <li class=md-nav__item> <a href=../../../stable/mysql-workbench/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/mysql-workbench/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/mysql-workbench/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/mysql-workbench/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_150 type=checkbox id=__nav_5_4_150> <label class=md-nav__link for=__nav_5_4_150> N8n <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=N8n data-md-level=3> <label class=md-nav__title for=__nav_5_4_150> <span class="md-nav__icon md-icon"></span> N8n </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/n8n/ class=md-nav__link> n8n </a> </li> <li class=md-nav__item> <a href=../../../stable/n8n/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/n8n/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/n8n/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/n8n/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_151 type=checkbox id=__nav_5_4_151> <label class=md-nav__link for=__nav_5_4_151> Nano wallet <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Nano wallet" data-md-level=3> <label class=md-nav__title for=__nav_5_4_151> <span class="md-nav__icon md-icon"></span> Nano wallet </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nano-wallet/ class=md-nav__link> nano-wallet </a> </li> <li class=md-nav__item> <a href=../../../stable/nano-wallet/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nano-wallet/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nano-wallet/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nano-wallet/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_152 type=checkbox id=__nav_5_4_152> <label class=md-nav__link for=__nav_5_4_152> Navidrome <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Navidrome data-md-level=3> <label class=md-nav__title for=__nav_5_4_152> <span class="md-nav__icon md-icon"></span> Navidrome </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/navidrome/ class=md-nav__link> navidrome </a> </li> <li class=md-nav__item> <a href=../../../stable/navidrome/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/navidrome/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/navidrome/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/navidrome/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_153 type=checkbox id=__nav_5_4_153> <label class=md-nav__link for=__nav_5_4_153> Nextcloud <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nextcloud data-md-level=3> <label class=md-nav__title for=__nav_5_4_153> <span class="md-nav__icon md-icon"></span> Nextcloud </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nextcloud/ class=md-nav__link> nextcloud </a> </li> <li class=md-nav__item> <a href=../../../stable/nextcloud/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nextcloud/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nextcloud/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nextcloud/notes/ class=md-nav__link> Important Notes </a> </li> <li class=md-nav__item> <a href=../../../stable/nextcloud/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_154 type=checkbox id=__nav_5_4_154> <label class=md-nav__link for=__nav_5_4_154> Nextpvr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nextpvr data-md-level=3> <label class=md-nav__title for=__nav_5_4_154> <span class="md-nav__icon md-icon"></span> Nextpvr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nextpvr/ class=md-nav__link> nextpvr </a> </li> <li class=md-nav__item> <a href=../../../stable/nextpvr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nextpvr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nextpvr/defaultcreds/ class=md-nav__link> Default Username/Password </a> </li> <li class=md-nav__item> <a href=../../../stable/nextpvr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nextpvr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_155 type=checkbox id=__nav_5_4_155> <label class=md-nav__link for=__nav_5_4_155> Ngircd <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ngircd data-md-level=3> <label class=md-nav__title for=__nav_5_4_155> <span class="md-nav__icon md-icon"></span> Ngircd </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ngircd/ class=md-nav__link> ngircd </a> </li> <li class=md-nav__item> <a href=../../../stable/ngircd/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ngircd/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ngircd/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ngircd/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_156 type=checkbox id=__nav_5_4_156> <label class=md-nav__link for=__nav_5_4_156> Nntp2nntp <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nntp2nntp data-md-level=3> <label class=md-nav__title for=__nav_5_4_156> <span class="md-nav__icon md-icon"></span> Nntp2nntp </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nntp2nntp/ class=md-nav__link> nntp2nntp </a> </li> <li class=md-nav__item> <a href=../../../stable/nntp2nntp/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nntp2nntp/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nntp2nntp/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nntp2nntp/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_157 type=checkbox id=__nav_5_4_157> <label class=md-nav__link for=__nav_5_4_157> Node red <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Node red" data-md-level=3> <label class=md-nav__title for=__nav_5_4_157> <span class="md-nav__icon md-icon"></span> Node red </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/node-red/ class=md-nav__link> node-red </a> </li> <li class=md-nav__item> <a href=../../../stable/node-red/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/node-red/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/node-red/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/node-red/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_158 type=checkbox id=__nav_5_4_158> <label class=md-nav__link for=__nav_5_4_158> Notes <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Notes data-md-level=3> <label class=md-nav__title for=__nav_5_4_158> <span class="md-nav__icon md-icon"></span> Notes </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/notes/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/notes/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/notes/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/notes/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_159 type=checkbox id=__nav_5_4_159> <label class=md-nav__link for=__nav_5_4_159> Novnc <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Novnc data-md-level=3> <label class=md-nav__title for=__nav_5_4_159> <span class="md-nav__icon md-icon"></span> Novnc </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/novnc/ class=md-nav__link> novnc </a> </li> <li class=md-nav__item> <a href=../../../stable/novnc/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/novnc/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/novnc/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/novnc/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_160 type=checkbox id=__nav_5_4_160> <label class=md-nav__link for=__nav_5_4_160> Nullserv <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nullserv data-md-level=3> <label class=md-nav__title for=__nav_5_4_160> <span class="md-nav__icon md-icon"></span> Nullserv </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nullserv/ class=md-nav__link> nullserv </a> </li> <li class=md-nav__item> <a href=../../../stable/nullserv/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nullserv/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nullserv/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nullserv/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_161 type=checkbox id=__nav_5_4_161> <label class=md-nav__link for=__nav_5_4_161> Nzbget <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nzbget data-md-level=3> <label class=md-nav__title for=__nav_5_4_161> <span class="md-nav__icon md-icon"></span> Nzbget </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nzbget/ class=md-nav__link> nzbget </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbget/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbget/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbget/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbget/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_162 type=checkbox id=__nav_5_4_162> <label class=md-nav__link for=__nav_5_4_162> Nzbhydra <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Nzbhydra data-md-level=3> <label class=md-nav__title for=__nav_5_4_162> <span class="md-nav__icon md-icon"></span> Nzbhydra </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/nzbhydra/ class=md-nav__link> nzbhydra </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbhydra/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbhydra/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbhydra/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/nzbhydra/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_163 type=checkbox id=__nav_5_4_163> <label class=md-nav__link for=__nav_5_4_163> Octoprint <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Octoprint data-md-level=3> <label class=md-nav__title for=__nav_5_4_163> <span class="md-nav__icon md-icon"></span> Octoprint </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/octoprint/ class=md-nav__link> octoprint </a> </li> <li class=md-nav__item> <a href=../../../stable/octoprint/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/octoprint/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/octoprint/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/octoprint/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_164 type=checkbox id=__nav_5_4_164> <label class=md-nav__link for=__nav_5_4_164> Odoo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Odoo data-md-level=3> <label class=md-nav__title for=__nav_5_4_164> <span class="md-nav__icon md-icon"></span> Odoo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/odoo/ class=md-nav__link> odoo </a> </li> <li class=md-nav__item> <a href=../../../stable/odoo/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/odoo/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/odoo/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/odoo/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_165 type=checkbox id=__nav_5_4_165> <label class=md-nav__link for=__nav_5_4_165> Omada controller <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Omada controller" data-md-level=3> <label class=md-nav__title for=__nav_5_4_165> <span class="md-nav__icon md-icon"></span> Omada controller </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/omada-controller/ class=md-nav__link> omada-controller </a> </li> <li class=md-nav__item> <a href=../../../stable/omada-controller/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/omada-controller/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/omada-controller/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/omada-controller/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_166 type=checkbox id=__nav_5_4_166> <label class=md-nav__link for=__nav_5_4_166> Ombi <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ombi data-md-level=3> <label class=md-nav__title for=__nav_5_4_166> <span class="md-nav__icon md-icon"></span> Ombi </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ombi/ class=md-nav__link> ombi </a> </li> <li class=md-nav__item> <a href=../../../stable/ombi/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ombi/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ombi/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ombi/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_167 type=checkbox id=__nav_5_4_167> <label class=md-nav__link for=__nav_5_4_167> Onlyoffice document server <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Onlyoffice document server" data-md-level=3> <label class=md-nav__title for=__nav_5_4_167> <span class="md-nav__icon md-icon"></span> Onlyoffice document server </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/onlyoffice-document-server/ class=md-nav__link> onlyoffice-document-server </a> </li> <li class=md-nav__item> <a href=../../../stable/onlyoffice-document-server/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/onlyoffice-document-server/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/onlyoffice-document-server/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/onlyoffice-document-server/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_168 type=checkbox id=__nav_5_4_168> <label class=md-nav__link for=__nav_5_4_168> Openhab <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Openhab data-md-level=3> <label class=md-nav__title for=__nav_5_4_168> <span class="md-nav__icon md-icon"></span> Openhab </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/openhab/ class=md-nav__link> openhab </a> </li> <li class=md-nav__item> <a href=../../../stable/openhab/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/openhab/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/openhab/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/openhab/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_169 type=checkbox id=__nav_5_4_169> <label class=md-nav__link for=__nav_5_4_169> Openkm <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Openkm data-md-level=3> <label class=md-nav__title for=__nav_5_4_169> <span class="md-nav__icon md-icon"></span> Openkm </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/openkm/ class=md-nav__link> openkm </a> </li> <li class=md-nav__item> <a href=../../../stable/openkm/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/openkm/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/openkm/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/openkm/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_170 type=checkbox id=__nav_5_4_170> <label class=md-nav__link for=__nav_5_4_170> Openldap <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Openldap data-md-level=3> <label class=md-nav__title for=__nav_5_4_170> <span class="md-nav__icon md-icon"></span> Openldap </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/openldap/ class=md-nav__link> openldap </a> </li> <li class=md-nav__item> <a href=../../../stable/openldap/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/openldap/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/openldap/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/openldap/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_171 type=checkbox id=__nav_5_4_171> <label class=md-nav__link for=__nav_5_4_171> Openvscode server <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Openvscode server" data-md-level=3> <label class=md-nav__title for=__nav_5_4_171> <span class="md-nav__icon md-icon"></span> Openvscode server </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/openvscode-server/ class=md-nav__link> openvscode-server </a> </li> <li class=md-nav__item> <a href=../../../stable/openvscode-server/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/openvscode-server/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/openvscode-server/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/openvscode-server/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_172 type=checkbox id=__nav_5_4_172> <label class=md-nav__link for=__nav_5_4_172> Organizr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Organizr data-md-level=3> <label class=md-nav__title for=__nav_5_4_172> <span class="md-nav__icon md-icon"></span> Organizr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/organizr/ class=md-nav__link> organizr </a> </li> <li class=md-nav__item> <a href=../../../stable/organizr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/organizr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/organizr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/organizr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_173 type=checkbox id=__nav_5_4_173> <label class=md-nav__link for=__nav_5_4_173> Oscam <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Oscam data-md-level=3> <label class=md-nav__title for=__nav_5_4_173> <span class="md-nav__icon md-icon"></span> Oscam </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/oscam/ class=md-nav__link> oscam </a> </li> <li class=md-nav__item> <a href=../../../stable/oscam/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/oscam/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/oscam/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/oscam/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_174 type=checkbox id=__nav_5_4_174> <label class=md-nav__link for=__nav_5_4_174> Outline <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Outline data-md-level=3> <label class=md-nav__title for=__nav_5_4_174> <span class="md-nav__icon md-icon"></span> Outline </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/outline/ class=md-nav__link> outline </a> </li> <li class=md-nav__item> <a href=../../../stable/outline/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/outline/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/outline/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/outline/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_175 type=checkbox id=__nav_5_4_175> <label class=md-nav__link for=__nav_5_4_175> Overseerr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Overseerr data-md-level=3> <label class=md-nav__title for=__nav_5_4_175> <span class="md-nav__icon md-icon"></span> Overseerr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/overseerr/ class=md-nav__link> overseerr </a> </li> <li class=md-nav__item> <a href=../../../stable/overseerr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/overseerr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/overseerr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/overseerr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_176 type=checkbox id=__nav_5_4_176> <label class=md-nav__link for=__nav_5_4_176> Owncast <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Owncast data-md-level=3> <label class=md-nav__title for=__nav_5_4_176> <span class="md-nav__icon md-icon"></span> Owncast </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/owncast/ class=md-nav__link> owncast </a> </li> <li class=md-nav__item> <a href=../../../stable/owncast/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/owncast/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/owncast/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/owncast/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_177 type=checkbox id=__nav_5_4_177> <label class=md-nav__link for=__nav_5_4_177> Owncloud ocis <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Owncloud ocis" data-md-level=3> <label class=md-nav__title for=__nav_5_4_177> <span class="md-nav__icon md-icon"></span> Owncloud ocis </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/owncloud-ocis/ class=md-nav__link> owncloud-ocis </a> </li> <li class=md-nav__item> <a href=../../../stable/owncloud-ocis/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/owncloud-ocis/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/owncloud-ocis/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/owncloud-ocis/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_178 type=checkbox id=__nav_5_4_178> <label class=md-nav__link for=__nav_5_4_178> Paperless ng <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Paperless ng" data-md-level=3> <label class=md-nav__title for=__nav_5_4_178> <span class="md-nav__icon md-icon"></span> Paperless ng </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/paperless-ng/ class=md-nav__link> paperless-ng </a> </li> <li class=md-nav__item> <a href=../../../stable/paperless-ng/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/paperless-ng/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/paperless-ng/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/paperless-ng/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_179 type=checkbox id=__nav_5_4_179> <label class=md-nav__link for=__nav_5_4_179> Papermerge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Papermerge data-md-level=3> <label class=md-nav__title for=__nav_5_4_179> <span class="md-nav__icon md-icon"></span> Papermerge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/papermerge/ class=md-nav__link> papermerge </a> </li> <li class=md-nav__item> <a href=../../../stable/papermerge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/papermerge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/papermerge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/papermerge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_180 type=checkbox id=__nav_5_4_180> <label class=md-nav__link for=__nav_5_4_180> Pgadmin <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pgadmin data-md-level=3> <label class=md-nav__title for=__nav_5_4_180> <span class="md-nav__icon md-icon"></span> Pgadmin </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pgadmin/ class=md-nav__link> pgadmin </a> </li> <li class=md-nav__item> <a href=../../../stable/pgadmin/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pgadmin/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pgadmin/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pgadmin/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_181 type=checkbox id=__nav_5_4_181> <label class=md-nav__link for=__nav_5_4_181> Photoprism <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Photoprism data-md-level=3> <label class=md-nav__title for=__nav_5_4_181> <span class="md-nav__icon md-icon"></span> Photoprism </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/photoprism/ class=md-nav__link> photoprism </a> </li> <li class=md-nav__item> <a href=../../../stable/photoprism/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/photoprism/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/photoprism/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/photoprism/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_182 type=checkbox id=__nav_5_4_182> <label class=md-nav__link for=__nav_5_4_182> Photoshow <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Photoshow data-md-level=3> <label class=md-nav__title for=__nav_5_4_182> <span class="md-nav__icon md-icon"></span> Photoshow </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/photoshow/ class=md-nav__link> photoshow </a> </li> <li class=md-nav__item> <a href=../../../stable/photoshow/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/photoshow/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/photoshow/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/photoshow/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_183 type=checkbox id=__nav_5_4_183> <label class=md-nav__link for=__nav_5_4_183> Photoview <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Photoview data-md-level=3> <label class=md-nav__title for=__nav_5_4_183> <span class="md-nav__icon md-icon"></span> Photoview </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/photoview/ class=md-nav__link> photoview </a> </li> <li class=md-nav__item> <a href=../../../stable/photoview/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/photoview/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/photoview/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/photoview/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_184 type=checkbox id=__nav_5_4_184> <label class=md-nav__link for=__nav_5_4_184> Phpldapadmin <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Phpldapadmin data-md-level=3> <label class=md-nav__title for=__nav_5_4_184> <span class="md-nav__icon md-icon"></span> Phpldapadmin </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/phpldapadmin/ class=md-nav__link> phpldapadmin </a> </li> <li class=md-nav__item> <a href=../../../stable/phpldapadmin/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/phpldapadmin/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/phpldapadmin/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/phpldapadmin/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_185 type=checkbox id=__nav_5_4_185> <label class=md-nav__link for=__nav_5_4_185> Piaware <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Piaware data-md-level=3> <label class=md-nav__title for=__nav_5_4_185> <span class="md-nav__icon md-icon"></span> Piaware </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/piaware/ class=md-nav__link> piaware </a> </li> <li class=md-nav__item> <a href=../../../stable/piaware/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/piaware/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/piaware/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/piaware/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_186 type=checkbox id=__nav_5_4_186> <label class=md-nav__link for=__nav_5_4_186> Pidgin <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pidgin data-md-level=3> <label class=md-nav__title for=__nav_5_4_186> <span class="md-nav__icon md-icon"></span> Pidgin </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pidgin/ class=md-nav__link> pidgin </a> </li> <li class=md-nav__item> <a href=../../../stable/pidgin/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pidgin/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pidgin/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pidgin/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_187 type=checkbox id=__nav_5_4_187> <label class=md-nav__link for=__nav_5_4_187> Pihole <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pihole data-md-level=3> <label class=md-nav__title for=__nav_5_4_187> <span class="md-nav__icon md-icon"></span> Pihole </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pihole/ class=md-nav__link> pihole </a> </li> <li class=md-nav__item> <a href=../../../stable/pihole/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pihole/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pihole/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pihole/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_188 type=checkbox id=__nav_5_4_188> <label class=md-nav__link for=__nav_5_4_188> Pixapop <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pixapop data-md-level=3> <label class=md-nav__title for=__nav_5_4_188> <span class="md-nav__icon md-icon"></span> Pixapop </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pixapop/ class=md-nav__link> pixapop </a> </li> <li class=md-nav__item> <a href=../../../stable/pixapop/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pixapop/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pixapop/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pixapop/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_189 type=checkbox id=__nav_5_4_189> <label class=md-nav__link for=__nav_5_4_189> Plex <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Plex data-md-level=3> <label class=md-nav__title for=__nav_5_4_189> <span class="md-nav__icon md-icon"></span> Plex </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/plex/ class=md-nav__link> plex </a> </li> <li class=md-nav__item> <a href=../../../stable/plex/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/plex/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/plex/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/plex/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_190 type=checkbox id=__nav_5_4_190> <label class=md-nav__link for=__nav_5_4_190> Podgrab <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Podgrab data-md-level=3> <label class=md-nav__title for=__nav_5_4_190> <span class="md-nav__icon md-icon"></span> Podgrab </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/podgrab/ class=md-nav__link> podgrab </a> </li> <li class=md-nav__item> <a href=../../../stable/podgrab/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/podgrab/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/podgrab/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/podgrab/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_191 type=checkbox id=__nav_5_4_191> <label class=md-nav__link for=__nav_5_4_191> Pretend youre xyzzy <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Pretend youre xyzzy" data-md-level=3> <label class=md-nav__title for=__nav_5_4_191> <span class="md-nav__icon md-icon"></span> Pretend youre xyzzy </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pretend-youre-xyzzy/ class=md-nav__link> pretend-youre-xyzzy </a> </li> <li class=md-nav__item> <a href=../../../stable/pretend-youre-xyzzy/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pretend-youre-xyzzy/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pretend-youre-xyzzy/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pretend-youre-xyzzy/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_192 type=checkbox id=__nav_5_4_192> <label class=md-nav__link for=__nav_5_4_192> Projectsend <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Projectsend data-md-level=3> <label class=md-nav__title for=__nav_5_4_192> <span class="md-nav__icon md-icon"></span> Projectsend </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/projectsend/ class=md-nav__link> projectsend </a> </li> <li class=md-nav__item> <a href=../../../stable/projectsend/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/projectsend/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/projectsend/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/projectsend/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_193 type=checkbox id=__nav_5_4_193> <label class=md-nav__link for=__nav_5_4_193> Promcord <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Promcord data-md-level=3> <label class=md-nav__title for=__nav_5_4_193> <span class="md-nav__icon md-icon"></span> Promcord </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/promcord/ class=md-nav__link> promcord </a> </li> <li class=md-nav__item> <a href=../../../stable/promcord/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/promcord/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/promcord/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/promcord/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_194 type=checkbox id=__nav_5_4_194> <label class=md-nav__link for=__nav_5_4_194> Protonmail bridge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Protonmail bridge" data-md-level=3> <label class=md-nav__title for=__nav_5_4_194> <span class="md-nav__icon md-icon"></span> Protonmail bridge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/protonmail-bridge/ class=md-nav__link> protonmail-bridge </a> </li> <li class=md-nav__item> <a href=../../../stable/protonmail-bridge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/protonmail-bridge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/protonmail-bridge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/protonmail-bridge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_195 type=checkbox id=__nav_5_4_195> <label class=md-nav__link for=__nav_5_4_195> Prowlarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Prowlarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_195> <span class="md-nav__icon md-icon"></span> Prowlarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/prowlarr/ class=md-nav__link> prowlarr </a> </li> <li class=md-nav__item> <a href=../../../stable/prowlarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/prowlarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/prowlarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/prowlarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_196 type=checkbox id=__nav_5_4_196> <label class=md-nav__link for=__nav_5_4_196> Pwndrop <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pwndrop data-md-level=3> <label class=md-nav__title for=__nav_5_4_196> <span class="md-nav__icon md-icon"></span> Pwndrop </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pwndrop/ class=md-nav__link> pwndrop </a> </li> <li class=md-nav__item> <a href=../../../stable/pwndrop/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pwndrop/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pwndrop/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pwndrop/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_197 type=checkbox id=__nav_5_4_197> <label class=md-nav__link for=__nav_5_4_197> Pydio cells <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Pydio cells" data-md-level=3> <label class=md-nav__title for=__nav_5_4_197> <span class="md-nav__icon md-icon"></span> Pydio cells </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pydio-cells/ class=md-nav__link> pydio-cells </a> </li> <li class=md-nav__item> <a href=../../../stable/pydio-cells/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pydio-cells/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pydio-cells/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pydio-cells/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_198 type=checkbox id=__nav_5_4_198> <label class=md-nav__link for=__nav_5_4_198> Pyload <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pyload data-md-level=3> <label class=md-nav__title for=__nav_5_4_198> <span class="md-nav__icon md-icon"></span> Pyload </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pyload/ class=md-nav__link> pyload </a> </li> <li class=md-nav__item> <a href=../../../stable/pyload/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pyload/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pyload/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pyload/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_199 type=checkbox id=__nav_5_4_199> <label class=md-nav__link for=__nav_5_4_199> Pylon <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Pylon data-md-level=3> <label class=md-nav__title for=__nav_5_4_199> <span class="md-nav__icon md-icon"></span> Pylon </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/pylon/ class=md-nav__link> pylon </a> </li> <li class=md-nav__item> <a href=../../../stable/pylon/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/pylon/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/pylon/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/pylon/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_200 type=checkbox id=__nav_5_4_200> <label class=md-nav__link for=__nav_5_4_200> Qbittorrent <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Qbittorrent data-md-level=3> <label class=md-nav__title for=__nav_5_4_200> <span class="md-nav__icon md-icon"></span> Qbittorrent </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/qbittorrent/ class=md-nav__link> qbittorrent </a> </li> <li class=md-nav__item> <a href=../../../stable/qbittorrent/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/qbittorrent/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/qbittorrent/defaultcreds/ class=md-nav__link> Default Username/Password </a> </li> <li class=md-nav__item> <a href=../../../stable/qbittorrent/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/qbittorrent/security/ class=md-nav__link> Security Overview </a> </li> <li class=md-nav__item> <a href=../../../stable/qbittorrent/vpn/ class=md-nav__link> Using VPN </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_201 type=checkbox id=__nav_5_4_201> <label class=md-nav__link for=__nav_5_4_201> Qdirstat <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Qdirstat data-md-level=3> <label class=md-nav__title for=__nav_5_4_201> <span class="md-nav__icon md-icon"></span> Qdirstat </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/qdirstat/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_202 type=checkbox id=__nav_5_4_202> <label class=md-nav__link for=__nav_5_4_202> Qinglong <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Qinglong data-md-level=3> <label class=md-nav__title for=__nav_5_4_202> <span class="md-nav__icon md-icon"></span> Qinglong </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/qinglong/ class=md-nav__link> qinglong </a> </li> <li class=md-nav__item> <a href=../../../stable/qinglong/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/qinglong/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/qinglong/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/qinglong/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_203 type=checkbox id=__nav_5_4_203> <label class=md-nav__link for=__nav_5_4_203> Quassel core <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Quassel core" data-md-level=3> <label class=md-nav__title for=__nav_5_4_203> <span class="md-nav__icon md-icon"></span> Quassel core </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/quassel-core/ class=md-nav__link> quassel-core </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-core/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-core/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-core/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-core/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_204 type=checkbox id=__nav_5_4_204> <label class=md-nav__link for=__nav_5_4_204> Quassel web <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Quassel web" data-md-level=3> <label class=md-nav__title for=__nav_5_4_204> <span class="md-nav__icon md-icon"></span> Quassel web </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/quassel-web/ class=md-nav__link> quassel-web </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-web/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-web/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-web/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/quassel-web/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_205 type=checkbox id=__nav_5_4_205> <label class=md-nav__link for=__nav_5_4_205> Radarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Radarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_205> <span class="md-nav__icon md-icon"></span> Radarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/radarr/ class=md-nav__link> radarr </a> </li> <li class=md-nav__item> <a href=../../../stable/radarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/radarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/radarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/radarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_206 type=checkbox id=__nav_5_4_206> <label class=md-nav__link for=__nav_5_4_206> Readarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Readarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_206> <span class="md-nav__icon md-icon"></span> Readarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/readarr/ class=md-nav__link> readarr </a> </li> <li class=md-nav__item> <a href=../../../stable/readarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/readarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/readarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/readarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_207 type=checkbox id=__nav_5_4_207> <label class=md-nav__link for=__nav_5_4_207> Recipes <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Recipes data-md-level=3> <label class=md-nav__title for=__nav_5_4_207> <span class="md-nav__icon md-icon"></span> Recipes </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/recipes/ class=md-nav__link> recipes </a> </li> <li class=md-nav__item> <a href=../../../stable/recipes/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/recipes/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/recipes/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/recipes/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_208 type=checkbox id=__nav_5_4_208> <label class=md-nav__link for=__nav_5_4_208> Redmine <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Redmine data-md-level=3> <label class=md-nav__title for=__nav_5_4_208> <span class="md-nav__icon md-icon"></span> Redmine </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/redmine/ class=md-nav__link> redmine </a> </li> <li class=md-nav__item> <a href=../../../stable/redmine/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/redmine/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/redmine/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/redmine/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_209 type=checkbox id=__nav_5_4_209> <label class=md-nav__link for=__nav_5_4_209> Reg <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Reg data-md-level=3> <label class=md-nav__title for=__nav_5_4_209> <span class="md-nav__icon md-icon"></span> Reg </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/reg/ class=md-nav__link> reg </a> </li> <li class=md-nav__item> <a href=../../../stable/reg/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/reg/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/reg/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/reg/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_210 type=checkbox id=__nav_5_4_210> <label class=md-nav__link for=__nav_5_4_210> Remmina <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Remmina data-md-level=3> <label class=md-nav__title for=__nav_5_4_210> <span class="md-nav__icon md-icon"></span> Remmina </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/remmina/ class=md-nav__link> remmina </a> </li> <li class=md-nav__item> <a href=../../../stable/remmina/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/remmina/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/remmina/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/remmina/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_211 type=checkbox id=__nav_5_4_211> <label class=md-nav__link for=__nav_5_4_211> Requestrr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Requestrr data-md-level=3> <label class=md-nav__title for=__nav_5_4_211> <span class="md-nav__icon md-icon"></span> Requestrr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/requestrr/ class=md-nav__link> requestrr </a> </li> <li class=md-nav__item> <a href=../../../stable/requestrr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/requestrr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/requestrr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/requestrr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_212 type=checkbox id=__nav_5_4_212> <label class=md-nav__link for=__nav_5_4_212> Resilio sync <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Resilio sync" data-md-level=3> <label class=md-nav__title for=__nav_5_4_212> <span class="md-nav__icon md-icon"></span> Resilio sync </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/resilio-sync/ class=md-nav__link> resilio-sync </a> </li> <li class=md-nav__item> <a href=../../../stable/resilio-sync/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/resilio-sync/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/resilio-sync/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/resilio-sync/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_213 type=checkbox id=__nav_5_4_213> <label class=md-nav__link for=__nav_5_4_213> Rsnapshot <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Rsnapshot data-md-level=3> <label class=md-nav__title for=__nav_5_4_213> <span class="md-nav__icon md-icon"></span> Rsnapshot </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/rsnapshot/ class=md-nav__link> rsnapshot </a> </li> <li class=md-nav__item> <a href=../../../stable/rsnapshot/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/rsnapshot/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/rsnapshot/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/rsnapshot/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_214 type=checkbox id=__nav_5_4_214> <label class=md-nav__link for=__nav_5_4_214> Rsshub <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Rsshub data-md-level=3> <label class=md-nav__title for=__nav_5_4_214> <span class="md-nav__icon md-icon"></span> Rsshub </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/rsshub/ class=md-nav__link> rsshub </a> </li> <li class=md-nav__item> <a href=../../../stable/rsshub/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/rsshub/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/rsshub/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/rsshub/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_215 type=checkbox id=__nav_5_4_215> <label class=md-nav__link for=__nav_5_4_215> Sabnzbd <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Sabnzbd data-md-level=3> <label class=md-nav__title for=__nav_5_4_215> <span class="md-nav__icon md-icon"></span> Sabnzbd </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/sabnzbd/ class=md-nav__link> sabnzbd </a> </li> <li class=md-nav__item> <a href=../../../stable/sabnzbd/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/sabnzbd/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/sabnzbd/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/sabnzbd/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_216 type=checkbox id=__nav_5_4_216> <label class=md-nav__link for=__nav_5_4_216> Scrutiny <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Scrutiny data-md-level=3> <label class=md-nav__title for=__nav_5_4_216> <span class="md-nav__icon md-icon"></span> Scrutiny </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/scrutiny/ class=md-nav__link> scrutiny </a> </li> <li class=md-nav__item> <a href=../../../stable/scrutiny/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/scrutiny/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/scrutiny/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/scrutiny/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_217 type=checkbox id=__nav_5_4_217> <label class=md-nav__link for=__nav_5_4_217> Ser2sock <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ser2sock data-md-level=3> <label class=md-nav__title for=__nav_5_4_217> <span class="md-nav__icon md-icon"></span> Ser2sock </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ser2sock/ class=md-nav__link> ser2sock </a> </li> <li class=md-nav__item> <a href=../../../stable/ser2sock/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ser2sock/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ser2sock/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ser2sock/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_218 type=checkbox id=__nav_5_4_218> <label class=md-nav__link for=__nav_5_4_218> Shiori <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Shiori data-md-level=3> <label class=md-nav__title for=__nav_5_4_218> <span class="md-nav__icon md-icon"></span> Shiori </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/shiori/ class=md-nav__link> shiori </a> </li> <li class=md-nav__item> <a href=../../../stable/shiori/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/shiori/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/shiori/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/shiori/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_219 type=checkbox id=__nav_5_4_219> <label class=md-nav__link for=__nav_5_4_219> Shlink <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Shlink data-md-level=3> <label class=md-nav__title for=__nav_5_4_219> <span class="md-nav__icon md-icon"></span> Shlink </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/shlink/ class=md-nav__link> shlink </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_220 type=checkbox id=__nav_5_4_220> <label class=md-nav__link for=__nav_5_4_220> Shlink web client <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Shlink web client" data-md-level=3> <label class=md-nav__title for=__nav_5_4_220> <span class="md-nav__icon md-icon"></span> Shlink web client </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/shlink-web-client/ class=md-nav__link> shlink-web-client </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink-web-client/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink-web-client/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink-web-client/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/shlink-web-client/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_221 type=checkbox id=__nav_5_4_221> <label class=md-nav__link for=__nav_5_4_221> Shorturl <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Shorturl data-md-level=3> <label class=md-nav__title for=__nav_5_4_221> <span class="md-nav__icon md-icon"></span> Shorturl </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/shorturl/ class=md-nav__link> shorturl </a> </li> <li class=md-nav__item> <a href=../../../stable/shorturl/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/shorturl/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/shorturl/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/shorturl/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_222 type=checkbox id=__nav_5_4_222> <label class=md-nav__link for=__nav_5_4_222> Sickchill <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Sickchill data-md-level=3> <label class=md-nav__title for=__nav_5_4_222> <span class="md-nav__icon md-icon"></span> Sickchill </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/sickchill/ class=md-nav__link> sickchill </a> </li> <li class=md-nav__item> <a href=../../../stable/sickchill/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/sickchill/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/sickchill/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/sickchill/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_223 type=checkbox id=__nav_5_4_223> <label class=md-nav__link for=__nav_5_4_223> Sickgear <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Sickgear data-md-level=3> <label class=md-nav__title for=__nav_5_4_223> <span class="md-nav__icon md-icon"></span> Sickgear </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/sickgear/ class=md-nav__link> sickgear </a> </li> <li class=md-nav__item> <a href=../../../stable/sickgear/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/sickgear/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/sickgear/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/sickgear/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_224 type=checkbox id=__nav_5_4_224> <label class=md-nav__link for=__nav_5_4_224> Smokeping <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Smokeping data-md-level=3> <label class=md-nav__title for=__nav_5_4_224> <span class="md-nav__icon md-icon"></span> Smokeping </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/smokeping/ class=md-nav__link> smokeping </a> </li> <li class=md-nav__item> <a href=../../../stable/smokeping/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/smokeping/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/smokeping/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/smokeping/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_225 type=checkbox id=__nav_5_4_225> <label class=md-nav__link for=__nav_5_4_225> Snipe it <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Snipe it" data-md-level=3> <label class=md-nav__title for=__nav_5_4_225> <span class="md-nav__icon md-icon"></span> Snipe it </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/snipe-it/ class=md-nav__link> snipe-it </a> </li> <li class=md-nav__item> <a href=../../../stable/snipe-it/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/snipe-it/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/snipe-it/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/snipe-it/notes/ class=md-nav__link> Initial install </a> </li> <li class=md-nav__item> <a href=../../../stable/snipe-it/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_226 type=checkbox id=__nav_5_4_226> <label class=md-nav__link for=__nav_5_4_226> Sogo <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Sogo data-md-level=3> <label class=md-nav__title for=__nav_5_4_226> <span class="md-nav__icon md-icon"></span> Sogo </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/sogo/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/sogo/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/sogo/CONFIG/ class=md-nav__link> Configuration Options </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_227 type=checkbox id=__nav_5_4_227> <label class=md-nav__link for=__nav_5_4_227> Sonarr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Sonarr data-md-level=3> <label class=md-nav__title for=__nav_5_4_227> <span class="md-nav__icon md-icon"></span> Sonarr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/sonarr/ class=md-nav__link> sonarr </a> </li> <li class=md-nav__item> <a href=../../../stable/sonarr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/sonarr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/sonarr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/sonarr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_228 type=checkbox id=__nav_5_4_228> <label class=md-nav__link for=__nav_5_4_228> Speedtest exporter <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Speedtest exporter" data-md-level=3> <label class=md-nav__title for=__nav_5_4_228> <span class="md-nav__icon md-icon"></span> Speedtest exporter </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/speedtest-exporter/ class=md-nav__link> speedtest-exporter </a> </li> <li class=md-nav__item> <a href=../../../stable/speedtest-exporter/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/speedtest-exporter/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/speedtest-exporter/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/speedtest-exporter/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_229 type=checkbox id=__nav_5_4_229> <label class=md-nav__link for=__nav_5_4_229> Spotweb <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Spotweb data-md-level=3> <label class=md-nav__title for=__nav_5_4_229> <span class="md-nav__icon md-icon"></span> Spotweb </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/spotweb/ class=md-nav__link> spotweb </a> </li> <li class=md-nav__item> <a href=../../../stable/spotweb/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/spotweb/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/spotweb/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/spotweb/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_230 type=checkbox id=__nav_5_4_230> <label class=md-nav__link for=__nav_5_4_230> Sqlitebrowser <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Sqlitebrowser data-md-level=3> <label class=md-nav__title for=__nav_5_4_230> <span class="md-nav__icon md-icon"></span> Sqlitebrowser </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/sqlitebrowser/ class=md-nav__link> sqlitebrowser </a> </li> <li class=md-nav__item> <a href=../../../stable/sqlitebrowser/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/sqlitebrowser/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/sqlitebrowser/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/sqlitebrowser/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_231 type=checkbox id=__nav_5_4_231> <label class=md-nav__link for=__nav_5_4_231> Stash <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Stash data-md-level=3> <label class=md-nav__title for=__nav_5_4_231> <span class="md-nav__icon md-icon"></span> Stash </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/stash/ class=md-nav__link> stash </a> </li> <li class=md-nav__item> <a href=../../../stable/stash/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/stash/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/stash/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/stash/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_232 type=checkbox id=__nav_5_4_232> <label class=md-nav__link for=__nav_5_4_232> Static <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Static data-md-level=3> <label class=md-nav__title for=__nav_5_4_232> <span class="md-nav__icon md-icon"></span> Static </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/static/ class=md-nav__link> static </a> </li> <li class=md-nav__item> <a href=../../../stable/static/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/static/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/static/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/static/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_233 type=checkbox id=__nav_5_4_233> <label class=md-nav__link for=__nav_5_4_233> Statping <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Statping data-md-level=3> <label class=md-nav__title for=__nav_5_4_233> <span class="md-nav__icon md-icon"></span> Statping </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/statping/ class=md-nav__link> statping </a> </li> <li class=md-nav__item> <a href=../../../stable/statping/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/statping/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/statping/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/statping/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_234 type=checkbox id=__nav_5_4_234> <label class=md-nav__link for=__nav_5_4_234> Storj node <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Storj node" data-md-level=3> <label class=md-nav__title for=__nav_5_4_234> <span class="md-nav__icon md-icon"></span> Storj node </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/storj-node/ class=md-nav__link> storj-node </a> </li> <li class=md-nav__item> <a href=../../../stable/storj-node/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/storj-node/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/storj-node/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/storj-node/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_235 type=checkbox id=__nav_5_4_235> <label class=md-nav__link for=__nav_5_4_235> Strapi <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Strapi data-md-level=3> <label class=md-nav__title for=__nav_5_4_235> <span class="md-nav__icon md-icon"></span> Strapi </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/strapi/ class=md-nav__link> strapi </a> </li> <li class=md-nav__item> <a href=../../../stable/strapi/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/strapi/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/strapi/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/strapi/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_236 type=checkbox id=__nav_5_4_236> <label class=md-nav__link for=__nav_5_4_236> Synapse <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Synapse data-md-level=3> <label class=md-nav__title for=__nav_5_4_236> <span class="md-nav__icon md-icon"></span> Synapse </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/synapse/ class=md-nav__link> synapse </a> </li> <li class=md-nav__item> <a href=../../../stable/synapse/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/synapse/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/synapse/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/synapse/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_237 type=checkbox id=__nav_5_4_237> <label class=md-nav__link for=__nav_5_4_237> Synclounge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Synclounge data-md-level=3> <label class=md-nav__title for=__nav_5_4_237> <span class="md-nav__icon md-icon"></span> Synclounge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/synclounge/ class=md-nav__link> synclounge </a> </li> <li class=md-nav__item> <a href=../../../stable/synclounge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/synclounge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/synclounge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/synclounge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_238 type=checkbox id=__nav_5_4_238> <label class=md-nav__link for=__nav_5_4_238> Syncthing <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Syncthing data-md-level=3> <label class=md-nav__title for=__nav_5_4_238> <span class="md-nav__icon md-icon"></span> Syncthing </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/syncthing/ class=md-nav__link> syncthing </a> </li> <li class=md-nav__item> <a href=../../../stable/syncthing/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/syncthing/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/syncthing/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/syncthing/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_239 type=checkbox id=__nav_5_4_239> <label class=md-nav__link for=__nav_5_4_239> Syslog ng <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Syslog ng" data-md-level=3> <label class=md-nav__title for=__nav_5_4_239> <span class="md-nav__icon md-icon"></span> Syslog ng </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/syslog-ng/ class=md-nav__link> syslog-ng </a> </li> <li class=md-nav__item> <a href=../../../stable/syslog-ng/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/syslog-ng/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/syslog-ng/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/syslog-ng/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_240 type=checkbox id=__nav_5_4_240> <label class=md-nav__link for=__nav_5_4_240> Tautulli <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Tautulli data-md-level=3> <label class=md-nav__title for=__nav_5_4_240> <span class="md-nav__icon md-icon"></span> Tautulli </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/tautulli/ class=md-nav__link> tautulli </a> </li> <li class=md-nav__item> <a href=../../../stable/tautulli/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/tautulli/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/tautulli/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/tautulli/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_241 type=checkbox id=__nav_5_4_241> <label class=md-nav__link for=__nav_5_4_241> Teamspeak3 <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Teamspeak3 data-md-level=3> <label class=md-nav__title for=__nav_5_4_241> <span class="md-nav__icon md-icon"></span> Teamspeak3 </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/teamspeak3/ class=md-nav__link> teamspeak3 </a> </li> <li class=md-nav__item> <a href=../../../stable/teamspeak3/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/teamspeak3/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/teamspeak3/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/teamspeak3/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_242 type=checkbox id=__nav_5_4_242> <label class=md-nav__link for=__nav_5_4_242> Teedy <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Teedy data-md-level=3> <label class=md-nav__title for=__nav_5_4_242> <span class="md-nav__icon md-icon"></span> Teedy </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/teedy/ class=md-nav__link> teedy </a> </li> <li class=md-nav__item> <a href=../../../stable/teedy/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/teedy/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/teedy/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/teedy/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_243 type=checkbox id=__nav_5_4_243> <label class=md-nav__link for=__nav_5_4_243> Thelounge <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Thelounge data-md-level=3> <label class=md-nav__title for=__nav_5_4_243> <span class="md-nav__icon md-icon"></span> Thelounge </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/thelounge/ class=md-nav__link> thelounge </a> </li> <li class=md-nav__item> <a href=../../../stable/thelounge/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/thelounge/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/thelounge/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/thelounge/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_244 type=checkbox id=__nav_5_4_244> <label class=md-nav__link for=__nav_5_4_244> Tinymediamanager <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Tinymediamanager data-md-level=3> <label class=md-nav__title for=__nav_5_4_244> <span class="md-nav__icon md-icon"></span> Tinymediamanager </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/tinymediamanager/ class=md-nav__link> tinymediamanager </a> </li> <li class=md-nav__item> <a href=../../../stable/tinymediamanager/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/tinymediamanager/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/tinymediamanager/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/tinymediamanager/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_245 type=checkbox id=__nav_5_4_245> <label class=md-nav__link for=__nav_5_4_245> Traccar <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Traccar data-md-level=3> <label class=md-nav__title for=__nav_5_4_245> <span class="md-nav__icon md-icon"></span> Traccar </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/traccar/ class=md-nav__link> traccar </a> </li> <li class=md-nav__item> <a href=../../../stable/traccar/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/traccar/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/traccar/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/traccar/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_246 type=checkbox id=__nav_5_4_246> <label class=md-nav__link for=__nav_5_4_246> Transmission <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Transmission data-md-level=3> <label class=md-nav__title for=__nav_5_4_246> <span class="md-nav__icon md-icon"></span> Transmission </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/transmission/ class=md-nav__link> transmission </a> </li> <li class=md-nav__item> <a href=../../../stable/transmission/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/transmission/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/transmission/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/transmission/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_247 type=checkbox id=__nav_5_4_247> <label class=md-nav__link for=__nav_5_4_247> Trilium notes <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Trilium notes" data-md-level=3> <label class=md-nav__title for=__nav_5_4_247> <span class="md-nav__icon md-icon"></span> Trilium notes </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/trilium-notes/ class=md-nav__link> trilium-notes </a> </li> <li class=md-nav__item> <a href=../../../stable/trilium-notes/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/trilium-notes/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/trilium-notes/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/trilium-notes/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_248 type=checkbox id=__nav_5_4_248> <label class=md-nav__link for=__nav_5_4_248> Truecommand <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Truecommand data-md-level=3> <label class=md-nav__title for=__nav_5_4_248> <span class="md-nav__icon md-icon"></span> Truecommand </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/truecommand/ class=md-nav__link> truecommand </a> </li> <li class=md-nav__item> <a href=../../../stable/truecommand/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/truecommand/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/truecommand/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/truecommand/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_249 type=checkbox id=__nav_5_4_249> <label class=md-nav__link for=__nav_5_4_249> Tsmuxer <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Tsmuxer data-md-level=3> <label class=md-nav__title for=__nav_5_4_249> <span class="md-nav__icon md-icon"></span> Tsmuxer </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/tsmuxer/notes/ class=md-nav__link> Installation Notes </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_250 type=checkbox id=__nav_5_4_250> <label class=md-nav__link for=__nav_5_4_250> Tt rss <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Tt rss" data-md-level=3> <label class=md-nav__title for=__nav_5_4_250> <span class="md-nav__icon md-icon"></span> Tt rss </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/tt-rss/ class=md-nav__link> tt-rss </a> </li> <li class=md-nav__item> <a href=../../../stable/tt-rss/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/tt-rss/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/tt-rss/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/tt-rss/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_251 type=checkbox id=__nav_5_4_251> <label class=md-nav__link for=__nav_5_4_251> Tvheadend <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Tvheadend data-md-level=3> <label class=md-nav__title for=__nav_5_4_251> <span class="md-nav__icon md-icon"></span> Tvheadend </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/tvheadend/ class=md-nav__link> tvheadend </a> </li> <li class=md-nav__item> <a href=../../../stable/tvheadend/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/tvheadend/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/tvheadend/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/tvheadend/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_252 type=checkbox id=__nav_5_4_252> <label class=md-nav__link for=__nav_5_4_252> Twtxt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Twtxt data-md-level=3> <label class=md-nav__title for=__nav_5_4_252> <span class="md-nav__icon md-icon"></span> Twtxt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/twtxt/ class=md-nav__link> twtxt </a> </li> <li class=md-nav__item> <a href=../../../stable/twtxt/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/twtxt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/twtxt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/twtxt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_253 type=checkbox id=__nav_5_4_253> <label class=md-nav__link for=__nav_5_4_253> Ubooquity <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Ubooquity data-md-level=3> <label class=md-nav__title for=__nav_5_4_253> <span class="md-nav__icon md-icon"></span> Ubooquity </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/ubooquity/ class=md-nav__link> ubooquity </a> </li> <li class=md-nav__item> <a href=../../../stable/ubooquity/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/ubooquity/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/ubooquity/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/ubooquity/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_254 type=checkbox id=__nav_5_4_254> <label class=md-nav__link for=__nav_5_4_254> Unifi <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Unifi data-md-level=3> <label class=md-nav__title for=__nav_5_4_254> <span class="md-nav__icon md-icon"></span> Unifi </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/unifi/ class=md-nav__link> unifi </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_255 type=checkbox id=__nav_5_4_255> <label class=md-nav__link for=__nav_5_4_255> Unifi poller <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Unifi poller" data-md-level=3> <label class=md-nav__title for=__nav_5_4_255> <span class="md-nav__icon md-icon"></span> Unifi poller </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/unifi-poller/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi-poller/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi-poller/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/unifi-poller/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_256 type=checkbox id=__nav_5_4_256> <label class=md-nav__link for=__nav_5_4_256> Unmanic <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Unmanic data-md-level=3> <label class=md-nav__title for=__nav_5_4_256> <span class="md-nav__icon md-icon"></span> Unmanic </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/unmanic/ class=md-nav__link> unmanic </a> </li> <li class=md-nav__item> <a href=../../../stable/unmanic/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/unmanic/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/unmanic/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/unmanic/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_257 type=checkbox id=__nav_5_4_257> <label class=md-nav__link for=__nav_5_4_257> Unpackerr <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Unpackerr data-md-level=3> <label class=md-nav__title for=__nav_5_4_257> <span class="md-nav__icon md-icon"></span> Unpackerr </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/unpackerr/ class=md-nav__link> unpackerr </a> </li> <li class=md-nav__item> <a href=../../../stable/unpackerr/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/unpackerr/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/unpackerr/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/unpackerr/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_258 type=checkbox id=__nav_5_4_258> <label class=md-nav__link for=__nav_5_4_258> Unpoller <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Unpoller data-md-level=3> <label class=md-nav__title for=__nav_5_4_258> <span class="md-nav__icon md-icon"></span> Unpoller </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/unpoller/ class=md-nav__link> unpoller </a> </li> <li class=md-nav__item> <a href=../../../stable/unpoller/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/unpoller/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/unpoller/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/unpoller/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_259 type=checkbox id=__nav_5_4_259> <label class=md-nav__link for=__nav_5_4_259> Uptime kuma <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Uptime kuma" data-md-level=3> <label class=md-nav__title for=__nav_5_4_259> <span class="md-nav__icon md-icon"></span> Uptime kuma </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/uptime-kuma/ class=md-nav__link> uptime-kuma </a> </li> <li class=md-nav__item> <a href=../../../stable/uptime-kuma/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/uptime-kuma/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/uptime-kuma/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/uptime-kuma/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_260 type=checkbox id=__nav_5_4_260> <label class=md-nav__link for=__nav_5_4_260> Uptimerobot prometheus <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label="Uptimerobot prometheus" data-md-level=3> <label class=md-nav__title for=__nav_5_4_260> <span class="md-nav__icon md-icon"></span> Uptimerobot prometheus </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/uptimerobot-prometheus/ class=md-nav__link> uptimerobot-prometheus </a> </li> <li class=md-nav__item> <a href=../../../stable/uptimerobot-prometheus/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/uptimerobot-prometheus/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/uptimerobot-prometheus/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/uptimerobot-prometheus/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_261 type=checkbox id=__nav_5_4_261> <label class=md-nav__link for=__nav_5_4_261> Valheim <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Valheim data-md-level=3> <label class=md-nav__title for=__nav_5_4_261> <span class="md-nav__icon md-icon"></span> Valheim </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/valheim/ class=md-nav__link> valheim </a> </li> <li class=md-nav__item> <a href=../../../stable/valheim/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/valheim/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/valheim/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/valheim/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_262 type=checkbox id=__nav_5_4_262> <label class=md-nav__link for=__nav_5_4_262> Vaultwarden <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Vaultwarden data-md-level=3> <label class=md-nav__title for=__nav_5_4_262> <span class="md-nav__icon md-icon"></span> Vaultwarden </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/vaultwarden/ class=md-nav__link> vaultwarden </a> </li> <li class=md-nav__item> <a href=../../../stable/vaultwarden/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/vaultwarden/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/vaultwarden/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/vaultwarden/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_263 type=checkbox id=__nav_5_4_263> <label class=md-nav__link for=__nav_5_4_263> Verysync <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Verysync data-md-level=3> <label class=md-nav__title for=__nav_5_4_263> <span class="md-nav__icon md-icon"></span> Verysync </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/verysync/ class=md-nav__link> verysync </a> </li> <li class=md-nav__item> <a href=../../../stable/verysync/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/verysync/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/verysync/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/verysync/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_264 type=checkbox id=__nav_5_4_264> <label class=md-nav__link for=__nav_5_4_264> Webgrabplus <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Webgrabplus data-md-level=3> <label class=md-nav__title for=__nav_5_4_264> <span class="md-nav__icon md-icon"></span> Webgrabplus </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/webgrabplus/ class=md-nav__link> webgrabplus </a> </li> <li class=md-nav__item> <a href=../../../stable/webgrabplus/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/webgrabplus/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/webgrabplus/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/webgrabplus/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_265 type=checkbox id=__nav_5_4_265> <label class=md-nav__link for=__nav_5_4_265> Weblate <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Weblate data-md-level=3> <label class=md-nav__title for=__nav_5_4_265> <span class="md-nav__icon md-icon"></span> Weblate </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/weblate/ class=md-nav__link> weblate </a> </li> <li class=md-nav__item> <a href=../../../stable/weblate/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/weblate/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/weblate/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/weblate/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_266 type=checkbox id=__nav_5_4_266> <label class=md-nav__link for=__nav_5_4_266> Wger <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Wger data-md-level=3> <label class=md-nav__title for=__nav_5_4_266> <span class="md-nav__icon md-icon"></span> Wger </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/wger/defaultcreds/ class=md-nav__link> Default Username/Password </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_267 type=checkbox id=__nav_5_4_267> <label class=md-nav__link for=__nav_5_4_267> Whoogle <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Whoogle data-md-level=3> <label class=md-nav__title for=__nav_5_4_267> <span class="md-nav__icon md-icon"></span> Whoogle </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/whoogle/ class=md-nav__link> whoogle </a> </li> <li class=md-nav__item> <a href=../../../stable/whoogle/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/whoogle/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/whoogle/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/whoogle/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_268 type=checkbox id=__nav_5_4_268> <label class=md-nav__link for=__nav_5_4_268> Wiki <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Wiki data-md-level=3> <label class=md-nav__title for=__nav_5_4_268> <span class="md-nav__icon md-icon"></span> Wiki </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/wiki/ class=md-nav__link> Introduction </a> </li> <li class=md-nav__item> <a href=../../../stable/wiki/CHANGELOG/ class=md-nav__link> Changelog<br> </a> </li> <li class=md-nav__item> <a href=../../../stable/wiki/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/wiki/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/wiki/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_269 type=checkbox id=__nav_5_4_269> <label class=md-nav__link for=__nav_5_4_269> Wikijs <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Wikijs data-md-level=3> <label class=md-nav__title for=__nav_5_4_269> <span class="md-nav__icon md-icon"></span> Wikijs </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/wikijs/ class=md-nav__link> wikijs </a> </li> <li class=md-nav__item> <a href=../../../stable/wikijs/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/wikijs/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/wikijs/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/wikijs/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_270 type=checkbox id=__nav_5_4_270> <label class=md-nav__link for=__nav_5_4_270> Wireshark <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Wireshark data-md-level=3> <label class=md-nav__title for=__nav_5_4_270> <span class="md-nav__icon md-icon"></span> Wireshark </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/wireshark/ class=md-nav__link> wireshark </a> </li> <li class=md-nav__item> <a href=../../../stable/wireshark/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/wireshark/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/wireshark/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/wireshark/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_271 type=checkbox id=__nav_5_4_271> <label class=md-nav__link for=__nav_5_4_271> Xbackbone <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Xbackbone data-md-level=3> <label class=md-nav__title for=__nav_5_4_271> <span class="md-nav__icon md-icon"></span> Xbackbone </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/xbackbone/ class=md-nav__link> xbackbone </a> </li> <li class=md-nav__item> <a href=../../../stable/xbackbone/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/xbackbone/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/xbackbone/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/xbackbone/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_272 type=checkbox id=__nav_5_4_272> <label class=md-nav__link for=__nav_5_4_272> Xteve <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Xteve data-md-level=3> <label class=md-nav__title for=__nav_5_4_272> <span class="md-nav__icon md-icon"></span> Xteve </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/xteve/ class=md-nav__link> xteve </a> </li> <li class=md-nav__item> <a href=../../../stable/xteve/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/xteve/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/xteve/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/xteve/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_273 type=checkbox id=__nav_5_4_273> <label class=md-nav__link for=__nav_5_4_273> Zerotier <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Zerotier data-md-level=3> <label class=md-nav__title for=__nav_5_4_273> <span class="md-nav__icon md-icon"></span> Zerotier </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/zerotier/ class=md-nav__link> zerotier </a> </li> <li class=md-nav__item> <a href=../../../stable/zerotier/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/zerotier/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/zerotier/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/zerotier/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_274 type=checkbox id=__nav_5_4_274> <label class=md-nav__link for=__nav_5_4_274> Zigbee2mqtt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Zigbee2mqtt data-md-level=3> <label class=md-nav__title for=__nav_5_4_274> <span class="md-nav__icon md-icon"></span> Zigbee2mqtt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/zigbee2mqtt/ class=md-nav__link> zigbee2mqtt </a> </li> <li class=md-nav__item> <a href=../../../stable/zigbee2mqtt/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/zigbee2mqtt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/zigbee2mqtt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/zigbee2mqtt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_275 type=checkbox id=__nav_5_4_275> <label class=md-nav__link for=__nav_5_4_275> Znc <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Znc data-md-level=3> <label class=md-nav__title for=__nav_5_4_275> <span class="md-nav__icon md-icon"></span> Znc </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/znc/ class=md-nav__link> znc </a> </li> <li class=md-nav__item> <a href=../../../stable/znc/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/znc/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/znc/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/znc/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> <li class="md-nav__item md-nav__item--nested"> <input class="md-nav__toggle md-toggle" data-md-toggle=__nav_5_4_276 type=checkbox id=__nav_5_4_276> <label class=md-nav__link for=__nav_5_4_276> Zwavejs2mqtt <span class="md-nav__icon md-icon"></span> </label> <nav class=md-nav aria-label=Zwavejs2mqtt data-md-level=3> <label class=md-nav__title for=__nav_5_4_276> <span class="md-nav__icon md-icon"></span> Zwavejs2mqtt </label> <ul class=md-nav__list data-md-scrollfix> <li class=md-nav__item> <a href=../../../stable/zwavejs2mqtt/ class=md-nav__link> zwavejs2mqtt </a> </li> <li class=md-nav__item> <a href=../../../stable/zwavejs2mqtt/CHANGELOG/ class=md-nav__link> Changelog </a> </li> <li class=md-nav__item> <a href=../../../stable/zwavejs2mqtt/CONFIG/ class=md-nav__link> Configuration Options </a> </li> <li class=md-nav__item> <a href=../../../stable/zwavejs2mqtt/helm-values/ class=md-nav__link> Default Helm-Values </a> </li> <li class=md-nav__item> <a href=../../../stable/zwavejs2mqtt/security/ class=md-nav__link> Security Overview </a> </li> </ul> </nav> </li> </ul> </nav> </li> </ul> </nav> </li> </ul> </nav> </div> </div> </div> <div class="md-sidebar md-sidebar--secondary" data-md-component=sidebar data-md-type=toc hidden> <div class=md-sidebar__scrollwrap> <div class=md-sidebar__inner> <nav class="md-nav md-nav--secondary" aria-label="Table of contents"> <label class=md-nav__title for=__toc> <span class="md-nav__icon md-icon"></span> Table of contents </label> <ul class=md-nav__list data-md-component=toc data-md-scrollfix> <li class=md-nav__item> <a href=#helm-chart class=md-nav__link> Helm-Chart </a> <nav class=md-nav aria-label=Helm-Chart> <ul class=md-nav__list> <li class=md-nav__item> <a href=#scan-results class=md-nav__link> Scan Results </a> </li> <li class=md-nav__item> <a href=#chart-object-ml-workspacetemplatescommonyaml class=md-nav__link> Chart Object: ml-workspace/templates/common.yaml </a> </li> </ul> </nav> </li> <li class=md-nav__item> <a href=#containers class=md-nav__link> Containers </a> <nav class=md-nav aria-label=Containers> <ul class=md-nav__list> <li class=md-nav__item> <a href=#detected-containers class=md-nav__link> Detected Containers </a> </li> <li class=md-nav__item> <a href=#scan-results_1 class=md-nav__link> Scan Results </a> </li> <li class=md-nav__item> <a href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152 class=md-nav__link> Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) </a> </li> <li class=md-nav__item> <a href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152_1 class=md-nav__link> Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) </a> </li> <li class=md-nav__item> <a href=#container-mltoolingml-workspace0132sha2565dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134-ubuntu-2004 class=md-nav__link> Container: mltooling/ml-workspace:0.13.2@sha256:5dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134 (ubuntu 20.04) </a> </li> </ul> </nav> </li> </ul> </nav> </div> </div> </div> <div class=md-content data-md-component=content> <article class="md-content__inner md-typeset"> <h1 id=security-overview>Security Overview<a class=headerlink href=#security-overview title="Permanent link">&para;</a></h1> <p><link href=https://truecharts.org/_static/trivy.css type=text/css rel=stylesheet></p> <h2 id=helm-chart>Helm-Chart<a class=headerlink href=#helm-chart title="Permanent link">&para;</a></h2> <h5 id=scan-results>Scan Results<a class=headerlink href=#scan-results title="Permanent link">&para;</a></h5> <h4 id=chart-object-ml-workspacetemplatescommonyaml>Chart Object: ml-workspace/templates/common.yaml<a class=headerlink href=#chart-object-ml-workspacetemplatescommonyaml title="Permanent link">&para;</a></h4> <table> <thead> <tr> <th align=left>Type</th> <th align=center>Misconfiguration ID</th> <th align=center>Check</th> <th align=center>Severity</th> <th>Explaination</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV001</td> <td align=center>Process can elevate its own privileges</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted>https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href=https://avd.aquasec.com/appshield/ksv001>https://avd.aquasec.com/appshield/ksv001</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV003</td> <td align=center>Default capabilities not dropped</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-ml-workspace&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/ >https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href=https://avd.aquasec.com/appshield/ksv003>https://avd.aquasec.com/appshield/ksv003</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV003</td> <td align=center>Default capabilities not dropped</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/ >https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href=https://avd.aquasec.com/appshield/ksv003>https://avd.aquasec.com/appshield/ksv003</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV011</td> <td align=center>CPU not limited</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> Enforcing CPU limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;resources.limits.cpu&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits>https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href=https://avd.aquasec.com/appshield/ksv011>https://avd.aquasec.com/appshield/ksv011</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV012</td> <td align=center>Runs as root user</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;RELEASE-NAME-ml-workspace&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted>https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href=https://avd.aquasec.com/appshield/ksv012>https://avd.aquasec.com/appshield/ksv012</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV012</td> <td align=center>Runs as root user</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted>https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href=https://avd.aquasec.com/appshield/ksv012>https://avd.aquasec.com/appshield/ksv012</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV012</td> <td align=center>Runs as root user</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted>https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href=https://avd.aquasec.com/appshield/ksv012>https://avd.aquasec.com/appshield/ksv012</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV014</td> <td align=center>Root file system is not read-only</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-ml-workspace&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/ >https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href=https://avd.aquasec.com/appshield/ksv014>https://avd.aquasec.com/appshield/ksv014</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV014</td> <td align=center>Root file system is not read-only</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/ >https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href=https://avd.aquasec.com/appshield/ksv014>https://avd.aquasec.com/appshield/ksv014</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV014</td> <td align=center>Root file system is not read-only</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/ >https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href=https://avd.aquasec.com/appshield/ksv014>https://avd.aquasec.com/appshield/ksv014</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV015</td> <td align=center>CPU requests not specified</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;resources.requests.cpu&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits>https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href=https://avd.aquasec.com/appshield/ksv015>https://avd.aquasec.com/appshield/ksv015</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV016</td> <td align=center>Memory requests not specified</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;resources.requests.memory&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-resources-limits-memory/ >https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href=https://avd.aquasec.com/appshield/ksv016>https://avd.aquasec.com/appshield/ksv016</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV017</td> <td align=center>Privileged container</td> <td align=center>HIGH</td> <td><details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.privileged&#39; to false </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline>https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href=https://avd.aquasec.com/appshield/ksv017>https://avd.aquasec.com/appshield/ksv017</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV018</td> <td align=center>Memory not limited</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> Enforcing memory limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;resources.limits.memory&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-resources-limits-memory/ >https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href=https://avd.aquasec.com/appshield/ksv018>https://avd.aquasec.com/appshield/ksv018</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV020</td> <td align=center>Runs with low user ID</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-ml-workspace&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-runasuser/ >https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href=https://avd.aquasec.com/appshield/ksv020>https://avd.aquasec.com/appshield/ksv020</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV020</td> <td align=center>Runs with low user ID</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-runasuser/ >https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href=https://avd.aquasec.com/appshield/ksv020>https://avd.aquasec.com/appshield/ksv020</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV020</td> <td align=center>Runs with low user ID</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-runasuser/ >https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href=https://avd.aquasec.com/appshield/ksv020>https://avd.aquasec.com/appshield/ksv020</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV021</td> <td align=center>Runs with low group ID</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-ml-workspace&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-runasuser/ >https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href=https://avd.aquasec.com/appshield/ksv021>https://avd.aquasec.com/appshield/ksv021</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV021</td> <td align=center>Runs with low group ID</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-runasuser/ >https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href=https://avd.aquasec.com/appshield/ksv021>https://avd.aquasec.com/appshield/ksv021</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV021</td> <td align=center>Runs with low group ID</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details></td> <td><details><summary>Expand...</summary><a href=https://kubesec.io/basics/containers-securitycontext-runasuser/ >https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href=https://avd.aquasec.com/appshield/ksv021>https://avd.aquasec.com/appshield/ksv021</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV023</td> <td align=center>hostPath volumes mounted</td> <td align=center>MEDIUM</td> <td><details><summary>Expand...</summary> HostPath volumes must be forbidden. <br> <hr> <br> Deployment &#39;RELEASE-NAME-ml-workspace&#39; should not set &#39;spec.template.volumes.hostPath&#39; </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline>https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href=https://avd.aquasec.com/appshield/ksv023>https://avd.aquasec.com/appshield/ksv023</a><br></details></td> </tr> <tr> <td align=left>Kubernetes Security Check</td> <td align=center>KSV029</td> <td align=center>A root primary or supplementary GID set</td> <td align=center>LOW</td> <td><details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> Deployment &#39;RELEASE-NAME-ml-workspace&#39; should set &#39;spec.securityContext.runAsGroup&#39;, &#39;spec.securityContext.supplementalGroups[*]&#39; and &#39;spec.securityContext.fsGroup&#39; to integer greater than 0 </details></td> <td><details><summary>Expand...</summary><a href=https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted>https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href=https://avd.aquasec.com/appshield/ksv029>https://avd.aquasec.com/appshield/ksv029</a><br></details></td> </tr> </tbody> </table> <h2 id=containers>Containers<a class=headerlink href=#containers title="Permanent link">&para;</a></h2> <h5 id=detected-containers>Detected Containers<a class=headerlink href=#detected-containers title="Permanent link">&para;</a></h5> <div class=highlight><pre><span></span><code> tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
mltooling/ml-workspace:0.13.2@sha256:5dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134
</code></pre></div> <h5 id=scan-results_1>Scan Results<a class=headerlink href=#scan-results_1 title="Permanent link">&para;</a></h5> <h4 id=container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152>Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)<a class=headerlink href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152 title="Permanent link">&para;</a></h4> <p><strong>alpine</strong></p> <table> <thead> <tr> <th align=left>No Vulnerabilities found</th> </tr> </thead> <tbody> <tr> <td></td> </tr> </tbody> </table> <h4 id=container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152_1>Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)<a class=headerlink href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152_1 title="Permanent link">&para;</a></h4> <p><strong>alpine</strong></p> <table> <thead> <tr> <th align=left>No Vulnerabilities found</th> </tr> </thead> <tbody> <tr> <td></td> </tr> </tbody> </table> <h4 id=container-mltoolingml-workspace0132sha2565dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134-ubuntu-2004>Container: mltooling/ml-workspace:0.13.2@sha256:5dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134 (ubuntu 20.04)<a class=headerlink href=#container-mltoolingml-workspace0132sha2565dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134-ubuntu-2004 title="Permanent link">&para;</a></h4> <p><strong>ubuntu</strong></p> <table> <thead> <tr> <th align=left>Package</th> <th align=center>Vulnerability</th> <th align=center>Severity</th> <th align=center>Installed Version</th> <th align=center>Fixed Version</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2019-17567</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://httpd.apache.org/security/vulnerabilities_24.html>http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/06/10/2>http://www.openwall.com/lists/oss-security/2021/06/10/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567</a><br><a href=https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E>https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E>https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E>https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href=https://security.gentoo.org/glsa/202107-38>https://security.gentoo.org/glsa/202107-38</a><br><a href=https://security.netapp.com/advisory/ntap-20210702-0001/ >https://security.netapp.com/advisory/ntap-20210702-0001/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-33193</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.5</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193</a><br><a href=https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch>https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch</a><br><a href=https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E>https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E>https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/</a><br><a href=https://portswigger.net/research/http2>https://portswigger.net/research/http2</a><br><a href=https://security.netapp.com/advisory/ntap-20210917-0004/ >https://security.netapp.com/advisory/ntap-20210917-0004/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href=https://ubuntu.com/security/notices/USN-5090-1>https://ubuntu.com/security/notices/USN-5090-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.tenable.com/security/tns-2021-17>https://www.tenable.com/security/tns-2021-17</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-34798</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.5</td> <td><details><summary>Expand...</summary><a href=http://httpd.apache.org/security/vulnerabilities_24.html>http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10379">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10379</a><br><a href=https://linux.oracle.com/cve/CVE-2021-34798.html>https://linux.oracle.com/cve/CVE-2021-34798.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9005.html>https://linux.oracle.com/errata/ELSA-2022-9005.html</a><br><a href=https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href=https://security.netapp.com/advisory/ntap-20211008-0004/ >https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href=https://ubuntu.com/security/notices/USN-5090-1>https://ubuntu.com/security/notices/USN-5090-1</a><br><a href=https://ubuntu.com/security/notices/USN-5090-2>https://ubuntu.com/security/notices/USN-5090-2</a><br><a href=https://www.debian.org/security/2021/dsa-4982>https://www.debian.org/security/2021/dsa-4982</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.tenable.com/security/tns-2021-17>https://www.tenable.com/security/tns-2021-17</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-36160</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.5</td> <td><details><summary>Expand...</summary><a href=http://httpd.apache.org/security/vulnerabilities_24.html>http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160</a><br><a href=https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E>https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E>https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href=https://security.netapp.com/advisory/ntap-20211008-0004/ >https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href=https://ubuntu.com/security/notices/USN-5090-1>https://ubuntu.com/security/notices/USN-5090-1</a><br><a href=https://www.debian.org/security/2021/dsa-4982>https://www.debian.org/security/2021/dsa-4982</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-39275</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.5</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275</a><br><a href=https://linux.oracle.com/cve/CVE-2021-39275.html>https://linux.oracle.com/cve/CVE-2021-39275.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9005.html>https://linux.oracle.com/errata/ELSA-2022-9005.html</a><br><a href=https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href=https://security.netapp.com/advisory/ntap-20211008-0004/ >https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href=https://ubuntu.com/security/notices/USN-5090-1>https://ubuntu.com/security/notices/USN-5090-1</a><br><a href=https://ubuntu.com/security/notices/USN-5090-2>https://ubuntu.com/security/notices/USN-5090-2</a><br><a href=https://www.debian.org/security/2021/dsa-4982>https://www.debian.org/security/2021/dsa-4982</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-40438</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438</a><br><a href=https://linux.oracle.com/cve/CVE-2021-40438.html>https://linux.oracle.com/cve/CVE-2021-40438.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3856.html>https://linux.oracle.com/errata/ELSA-2021-3856.html</a><br><a href=https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E>https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E>https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href=https://security.netapp.com/advisory/ntap-20211008-0004/ >https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href=https://ubuntu.com/security/notices/USN-5090-1>https://ubuntu.com/security/notices/USN-5090-1</a><br><a href=https://ubuntu.com/security/notices/USN-5090-2>https://ubuntu.com/security/notices/USN-5090-2</a><br><a href="https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)">https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5090-3 (regression update)">https://ubuntu.com/security/notices/USN-5090-3 (regression update)</a><br><a href=https://www.debian.org/security/2021/dsa-4982>https://www.debian.org/security/2021/dsa-4982</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.tenable.com/security/tns-2021-17>https://www.tenable.com/security/tns-2021-17</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-44224</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.9</td> <td><details><summary>Expand...</summary><a href=http://httpd.apache.org/security/vulnerabilities_24.html>http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/12/20/3>http://www.openwall.com/lists/oss-security/2021/12/20/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href=https://security.netapp.com/advisory/ntap-20211224-0001/ >https://security.netapp.com/advisory/ntap-20211224-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5212-1>https://ubuntu.com/security/notices/USN-5212-1</a><br><a href=https://ubuntu.com/security/notices/USN-5212-2>https://ubuntu.com/security/notices/USN-5212-2</a><br><a href=https://www.debian.org/security/2022/dsa-5035>https://www.debian.org/security/2022/dsa-5035</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.tenable.com/security/tns-2022-01>https://www.tenable.com/security/tns-2022-01</a><br><a href=https://www.tenable.com/security/tns-2022-03>https://www.tenable.com/security/tns-2022-03</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2021-44790</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.9</td> <td><details><summary>Expand...</summary><a href=http://httpd.apache.org/security/vulnerabilities_24.html>http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/12/20/4>http://www.openwall.com/lists/oss-security/2021/12/20/4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://linux.oracle.com/cve/CVE-2021-44790.html>https://linux.oracle.com/cve/CVE-2021-44790.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0258.html>https://linux.oracle.com/errata/ELSA-2022-0258.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href=https://security.netapp.com/advisory/ntap-20211224-0001/ >https://security.netapp.com/advisory/ntap-20211224-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5212-1>https://ubuntu.com/security/notices/USN-5212-1</a><br><a href=https://ubuntu.com/security/notices/USN-5212-2>https://ubuntu.com/security/notices/USN-5212-2</a><br><a href=https://www.debian.org/security/2022/dsa-5035>https://www.debian.org/security/2022/dsa-5035</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.tenable.com/security/tns-2022-01>https://www.tenable.com/security/tns-2022-01</a><br><a href=https://www.tenable.com/security/tns-2022-03>https://www.tenable.com/security/tns-2022-03</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2022-22719</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/14/4>http://www.openwall.com/lists/oss-security/2022/03/14/4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0001/ >https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5333-1>https://ubuntu.com/security/notices/USN-5333-1</a><br><a href=https://ubuntu.com/security/notices/USN-5333-2>https://ubuntu.com/security/notices/USN-5333-2</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2022-22720</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/14/3>http://www.openwall.com/lists/oss-security/2022/03/14/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22720.html>https://linux.oracle.com/cve/CVE-2022-22720.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-1049.html>https://linux.oracle.com/errata/ELSA-2022-1049.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0001/ >https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5333-1>https://ubuntu.com/security/notices/USN-5333-1</a><br><a href=https://ubuntu.com/security/notices/USN-5333-2>https://ubuntu.com/security/notices/USN-5333-2</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2022-23943</td> <td align=center>MEDIUM</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/14/1>http://www.openwall.com/lists/oss-security/2022/03/14/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0001/ >https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5333-1>https://ubuntu.com/security/notices/USN-5333-1</a><br><a href=https://ubuntu.com/security/notices/USN-5333-2>https://ubuntu.com/security/notices/USN-5333-2</a><br></details></td> </tr> <tr> <td align=left>apache2-utils</td> <td align=center>CVE-2022-22721</td> <td align=center>LOW</td> <td align=center>2.4.41-4ubuntu3.3</td> <td align=center>2.4.41-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/14/2>http://www.openwall.com/lists/oss-security/2022/03/14/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html>https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href=https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721>https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0001/ >https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5333-1>https://ubuntu.com/security/notices/USN-5333-1</a><br><a href=https://ubuntu.com/security/notices/USN-5333-2>https://ubuntu.com/security/notices/USN-5333-2</a><br></details></td> </tr> <tr> <td align=left>bash</td> <td align=center>CVE-2019-18276</td> <td align=center>LOW</td> <td align=center>5.0-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html>http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a><br><a href=https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff>https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a><br><a href=https://linux.oracle.com/cve/CVE-2019-18276.html>https://linux.oracle.com/cve/CVE-2019-18276.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1679.html>https://linux.oracle.com/errata/ELSA-2021-1679.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/202105-34>https://security.gentoo.org/glsa/202105-34</a><br><a href=https://security.netapp.com/advisory/ntap-20200430-0003/ >https://security.netapp.com/advisory/ntap-20200430-0003/</a><br><a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a><br></details></td> </tr> <tr> <td align=left>binutils</td> <td align=center>CVE-2017-13716</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details></td> </tr> <tr> <td align=left>binutils</td> <td align=center>CVE-2018-20657</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106444>http://www.securityfocus.com/bid/106444</a><br><a href=https://access.redhat.com/errata/RHSA-2019:3352>https://access.redhat.com/errata/RHSA-2019:3352</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539</a><br><a href=https://linux.oracle.com/cve/CVE-2018-20657.html>https://linux.oracle.com/cve/CVE-2018-20657.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-3352.html>https://linux.oracle.com/errata/ELSA-2019-3352.html</a><br><a href=https://support.f5.com/csp/article/K62602089>https://support.f5.com/csp/article/K62602089</a><br></details></td> </tr> <tr> <td align=left>binutils</td> <td align=center>CVE-2019-1010204</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href=https://linux.oracle.com/cve/CVE-2019-1010204.html>https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1797.html>https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href=https://security.netapp.com/advisory/ntap-20190822-0001/ >https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details></td> </tr> <tr> <td align=left>binutils</td> <td align=center>CVE-2020-16592</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210115-0003/ >https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br></details></td> </tr> <tr> <td align=left>binutils</td> <td align=center>CVE-2021-3487</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3487.html>https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4364.html>https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>binutils</td> <td align=center>CVE-2021-45078</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0002/ >https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>binutils-common</td> <td align=center>CVE-2017-13716</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details></td> </tr> <tr> <td align=left>binutils-common</td> <td align=center>CVE-2018-20657</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106444>http://www.securityfocus.com/bid/106444</a><br><a href=https://access.redhat.com/errata/RHSA-2019:3352>https://access.redhat.com/errata/RHSA-2019:3352</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539</a><br><a href=https://linux.oracle.com/cve/CVE-2018-20657.html>https://linux.oracle.com/cve/CVE-2018-20657.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-3352.html>https://linux.oracle.com/errata/ELSA-2019-3352.html</a><br><a href=https://support.f5.com/csp/article/K62602089>https://support.f5.com/csp/article/K62602089</a><br></details></td> </tr> <tr> <td align=left>binutils-common</td> <td align=center>CVE-2019-1010204</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href=https://linux.oracle.com/cve/CVE-2019-1010204.html>https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1797.html>https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href=https://security.netapp.com/advisory/ntap-20190822-0001/ >https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details></td> </tr> <tr> <td align=left>binutils-common</td> <td align=center>CVE-2020-16592</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210115-0003/ >https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br></details></td> </tr> <tr> <td align=left>binutils-common</td> <td align=center>CVE-2021-3487</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3487.html>https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4364.html>https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>binutils-common</td> <td align=center>CVE-2021-45078</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0002/ >https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>binutils-x86-64-linux-gnu</td> <td align=center>CVE-2017-13716</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details></td> </tr> <tr> <td align=left>binutils-x86-64-linux-gnu</td> <td align=center>CVE-2018-20657</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106444>http://www.securityfocus.com/bid/106444</a><br><a href=https://access.redhat.com/errata/RHSA-2019:3352>https://access.redhat.com/errata/RHSA-2019:3352</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539</a><br><a href=https://linux.oracle.com/cve/CVE-2018-20657.html>https://linux.oracle.com/cve/CVE-2018-20657.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-3352.html>https://linux.oracle.com/errata/ELSA-2019-3352.html</a><br><a href=https://support.f5.com/csp/article/K62602089>https://support.f5.com/csp/article/K62602089</a><br></details></td> </tr> <tr> <td align=left>binutils-x86-64-linux-gnu</td> <td align=center>CVE-2019-1010204</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href=https://linux.oracle.com/cve/CVE-2019-1010204.html>https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1797.html>https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href=https://security.netapp.com/advisory/ntap-20190822-0001/ >https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details></td> </tr> <tr> <td align=left>binutils-x86-64-linux-gnu</td> <td align=center>CVE-2020-16592</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210115-0003/ >https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br></details></td> </tr> <tr> <td align=left>binutils-x86-64-linux-gnu</td> <td align=center>CVE-2021-3487</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3487.html>https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4364.html>https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>binutils-x86-64-linux-gnu</td> <td align=center>CVE-2021-45078</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0002/ >https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>bsdutils</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>bsdutils</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>coreutils</td> <td align=center>CVE-2016-2781</td> <td align=center>LOW</td> <td align=center>8.30-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2016/q1/452>http://seclists.org/oss-sec/2016/q1/452</a><br><a href=http://www.openwall.com/lists/oss-security/2016/02/28/2>http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href=http://www.openwall.com/lists/oss-security/2016/02/28/3>http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lore.kernel.org/patchwork/patch/793178/ >https://lore.kernel.org/patchwork/patch/793178/</a><br></details></td> </tr> <tr> <td align=left>cpp</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>1.185.1ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>cpp-8</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>cpp-9</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2021-22924</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22924.html>https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href=https://hackerone.com/reports/1223565>https://hackerone.com/reports/1223565</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22924.html>https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3582.html>https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2021-22925</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2021/Sep/39>http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href=http://seclists.org/fulldisclosure/2021/Sep/40>http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22925.html>https://curl.se/docs/CVE-2021-22925.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925</a><br><a href=https://hackerone.com/reports/1223882>https://hackerone.com/reports/1223882</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22925.html>https://linux.oracle.com/cve/CVE-2021-22925.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://support.apple.com/kb/HT212804>https://support.apple.com/kb/HT212804</a><br><a href=https://support.apple.com/kb/HT212805>https://support.apple.com/kb/HT212805</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2021-22946</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.7</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22946.html>https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href=https://hackerone.com/reports/1334111>https://hackerone.com/reports/1334111</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22946.html>https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4059.html>https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0003/ >https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://ubuntu.com/security/notices/USN-5079-1>https://ubuntu.com/security/notices/USN-5079-1</a><br><a href=https://ubuntu.com/security/notices/USN-5079-2>https://ubuntu.com/security/notices/USN-5079-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2021-22947</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.7</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22947.html>https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href=https://hackerone.com/reports/1334763>https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22947.html>https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4059.html>https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0003/ >https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://ubuntu.com/security/notices/USN-5079-1>https://ubuntu.com/security/notices/USN-5079-1</a><br><a href=https://ubuntu.com/security/notices/USN-5079-2>https://ubuntu.com/security/notices/USN-5079-2</a><br><a href=https://ubuntu.com/security/notices/USN-5079-3>https://ubuntu.com/security/notices/USN-5079-3</a><br><a href=https://ubuntu.com/security/notices/USN-5079-4>https://ubuntu.com/security/notices/USN-5079-4</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2021-22898</td> <td align=center>LOW</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/07/21/4>http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22898.html>https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href=https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde>https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href=https://hackerone.com/reports/1176461>https://hackerone.com/reports/1176461</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22898.html>https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E>https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>dbus</td> <td align=center>CVE-2020-35512</td> <td align=center>LOW</td> <td align=center>1.12.16-2ubuntu2.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.gentoo.org/755392>https://bugs.gentoo.org/755392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1909101">https://bugzilla.redhat.com/show_bug.cgi?id=1909101</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2020-35512>https://security-tracker.debian.org/tracker/CVE-2020-35512</a><br><a href=https://ubuntu.com/security/notices/USN-5244-1>https://ubuntu.com/security/notices/USN-5244-1</a><br></details></td> </tr> <tr> <td align=left>dbus-user-session</td> <td align=center>CVE-2020-35512</td> <td align=center>LOW</td> <td align=center>1.12.16-2ubuntu2.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.gentoo.org/755392>https://bugs.gentoo.org/755392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1909101">https://bugzilla.redhat.com/show_bug.cgi?id=1909101</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2020-35512>https://security-tracker.debian.org/tracker/CVE-2020-35512</a><br><a href=https://ubuntu.com/security/notices/USN-5244-1>https://ubuntu.com/security/notices/USN-5244-1</a><br></details></td> </tr> <tr> <td align=left>dbus-x11</td> <td align=center>CVE-2020-35512</td> <td align=center>LOW</td> <td align=center>1.12.16-2ubuntu2.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.gentoo.org/755392>https://bugs.gentoo.org/755392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1909101">https://bugzilla.redhat.com/show_bug.cgi?id=1909101</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2020-35512>https://security-tracker.debian.org/tracker/CVE-2020-35512</a><br><a href=https://ubuntu.com/security/notices/USN-5244-1>https://ubuntu.com/security/notices/USN-5244-1</a><br></details></td> </tr> <tr> <td align=left>fdisk</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>fdisk</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>g++</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>1.185.1ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>g++-9</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gcc</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>1.185.1ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gcc-8</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gcc-8-base</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gcc-9</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gcc-9-base</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gfortran-8</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>gir1.2-gdkpixbuf-2.0</td> <td align=center>CVE-2021-44648</td> <td align=center>MEDIUM</td> <td align=center>2.40.0+dfsg-3ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648</a><br><a href=https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136>https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/</a><br><a href=https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ >https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/</a><br></details></td> </tr> <tr> <td align=left>git</td> <td align=center>CVE-2018-1000021</td> <td align=center>LOW</td> <td align=center>1:2.32.0-1<sub>ppa0</sub>ubuntu20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html>http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021</a><br></details></td> </tr> <tr> <td align=left>git-lfs</td> <td align=center>CVE-2021-21237</td> <td align=center>MEDIUM</td> <td align=center>2.9.2-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21237">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21237</a><br><a href=https://github.com/advisories/GHSA-cx3w-xqmc-84g5>https://github.com/advisories/GHSA-cx3w-xqmc-84g5</a><br><a href=https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a>https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a</a><br><a href=https://github.com/git-lfs/git-lfs/releases/tag/v2.13.2>https://github.com/git-lfs/git-lfs/releases/tag/v2.13.2</a><br><a href=https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5>https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-21237>https://nvd.nist.gov/vuln/detail/CVE-2021-21237</a><br></details></td> </tr> <tr> <td align=left>git-man</td> <td align=center>CVE-2018-1000021</td> <td align=center>LOW</td> <td align=center>1:2.32.0-1<sub>ppa0</sub>ubuntu20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html>http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2017-17507</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507</a><br><a href=https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md</a><br><a href=https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17233</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17234</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17432</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17433</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17434</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17437</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2018-17438</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2019-8397</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul5>https://github.com/magicSwordsMan/PAAFS/tree/master/vul5</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2019-9151</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul7>https://github.com/magicSwordsMan/PAAFS/tree/master/vul7</a><br></details></td> </tr> <tr> <td align=left>hdf5-helpers</td> <td align=center>CVE-2019-9152</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul8>https://github.com/magicSwordsMan/PAAFS/tree/master/vul8</a><br></details></td> </tr> <tr> <td align=left>krb5-multidev</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>krb5-multidev</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libapparmor1</td> <td align=center>CVE-2016-1585</td> <td align=center>MEDIUM</td> <td align=center>2.13.3-7ubuntu5.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.launchpad.net/apparmor/+bug/1597017>https://bugs.launchpad.net/apparmor/+bug/1597017</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libarchive-dev</td> <td align=center>CVE-2021-36976</td> <td align=center>MEDIUM</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/27>http://seclists.org/fulldisclosure/2022/Mar/27</a><br><a href=http://seclists.org/fulldisclosure/2022/Mar/28>http://seclists.org/fulldisclosure/2022/Mar/28</a><br><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/</a><br><a href=https://support.apple.com/kb/HT213182>https://support.apple.com/kb/HT213182</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://support.apple.com/kb/HT213193>https://support.apple.com/kb/HT213193</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive-dev</td> <td align=center>CVE-2021-23177</td> <td align=center>LOW</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23177.html>https://linux.oracle.com/cve/CVE-2021-23177.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0892.html>https://linux.oracle.com/errata/ELSA-2022-0892.html</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive-dev</td> <td align=center>CVE-2021-31566</td> <td align=center>LOW</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566</a><br><a href=https://linux.oracle.com/cve/CVE-2021-31566.html>https://linux.oracle.com/cve/CVE-2021-31566.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0892.html>https://linux.oracle.com/errata/ELSA-2022-0892.html</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive-tools</td> <td align=center>CVE-2021-36976</td> <td align=center>MEDIUM</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/27>http://seclists.org/fulldisclosure/2022/Mar/27</a><br><a href=http://seclists.org/fulldisclosure/2022/Mar/28>http://seclists.org/fulldisclosure/2022/Mar/28</a><br><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/</a><br><a href=https://support.apple.com/kb/HT213182>https://support.apple.com/kb/HT213182</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://support.apple.com/kb/HT213193>https://support.apple.com/kb/HT213193</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive-tools</td> <td align=center>CVE-2021-23177</td> <td align=center>LOW</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23177.html>https://linux.oracle.com/cve/CVE-2021-23177.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0892.html>https://linux.oracle.com/errata/ELSA-2022-0892.html</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive-tools</td> <td align=center>CVE-2021-31566</td> <td align=center>LOW</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566</a><br><a href=https://linux.oracle.com/cve/CVE-2021-31566.html>https://linux.oracle.com/cve/CVE-2021-31566.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0892.html>https://linux.oracle.com/errata/ELSA-2022-0892.html</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive13</td> <td align=center>CVE-2021-36976</td> <td align=center>MEDIUM</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/27>http://seclists.org/fulldisclosure/2022/Mar/27</a><br><a href=http://seclists.org/fulldisclosure/2022/Mar/28>http://seclists.org/fulldisclosure/2022/Mar/28</a><br><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/</a><br><a href=https://support.apple.com/kb/HT213182>https://support.apple.com/kb/HT213182</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://support.apple.com/kb/HT213193>https://support.apple.com/kb/HT213193</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive13</td> <td align=center>CVE-2021-23177</td> <td align=center>LOW</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23177.html>https://linux.oracle.com/cve/CVE-2021-23177.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0892.html>https://linux.oracle.com/errata/ELSA-2022-0892.html</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libarchive13</td> <td align=center>CVE-2021-31566</td> <td align=center>LOW</td> <td align=center>3.4.0-2ubuntu1</td> <td align=center>3.4.0-2ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566</a><br><a href=https://linux.oracle.com/cve/CVE-2021-31566.html>https://linux.oracle.com/cve/CVE-2021-31566.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0892.html>https://linux.oracle.com/errata/ELSA-2022-0892.html</a><br><a href=https://ubuntu.com/security/notices/USN-5291-1>https://ubuntu.com/security/notices/USN-5291-1</a><br></details></td> </tr> <tr> <td align=left>libasan5</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>libasn1-8-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libbinutils</td> <td align=center>CVE-2017-13716</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details></td> </tr> <tr> <td align=left>libbinutils</td> <td align=center>CVE-2018-20657</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106444>http://www.securityfocus.com/bid/106444</a><br><a href=https://access.redhat.com/errata/RHSA-2019:3352>https://access.redhat.com/errata/RHSA-2019:3352</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539</a><br><a href=https://linux.oracle.com/cve/CVE-2018-20657.html>https://linux.oracle.com/cve/CVE-2018-20657.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-3352.html>https://linux.oracle.com/errata/ELSA-2019-3352.html</a><br><a href=https://support.f5.com/csp/article/K62602089>https://support.f5.com/csp/article/K62602089</a><br></details></td> </tr> <tr> <td align=left>libbinutils</td> <td align=center>CVE-2019-1010204</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href=https://linux.oracle.com/cve/CVE-2019-1010204.html>https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1797.html>https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href=https://security.netapp.com/advisory/ntap-20190822-0001/ >https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details></td> </tr> <tr> <td align=left>libbinutils</td> <td align=center>CVE-2020-16592</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210115-0003/ >https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br></details></td> </tr> <tr> <td align=left>libbinutils</td> <td align=center>CVE-2021-3487</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3487.html>https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4364.html>https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>libbinutils</td> <td align=center>CVE-2021-45078</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0002/ >https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>libblas-dev</td> <td align=center>CVE-2021-4048</td> <td align=center>LOW</td> <td align=center>3.9.0-1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048</a><br><a href=https://github.com/JuliaLang/julia/issues/42415>https://github.com/JuliaLang/julia/issues/42415</a><br><a href=https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781>https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781</a><br><a href=https://github.com/Reference-LAPACK/lapack/pull/625>https://github.com/Reference-LAPACK/lapack/pull/625</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c>https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41>https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7>https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7>https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/</a><br></details></td> </tr> <tr> <td align=left>libblas3</td> <td align=center>CVE-2021-4048</td> <td align=center>LOW</td> <td align=center>3.9.0-1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048</a><br><a href=https://github.com/JuliaLang/julia/issues/42415>https://github.com/JuliaLang/julia/issues/42415</a><br><a href=https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781>https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781</a><br><a href=https://github.com/Reference-LAPACK/lapack/pull/625>https://github.com/Reference-LAPACK/lapack/pull/625</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c>https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41>https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7>https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7>https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/</a><br></details></td> </tr> <tr> <td align=left>libblkid1</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libblkid1</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2021-3999</td> <td align=center>MEDIUM</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3999.html>https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/4>https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2016-10228</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/03/01/10>http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href=http://www.securityfocus.com/bid/96525>http://www.securityfocus.com/bid/96525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href=https://linux.oracle.com/cve/CVE-2016-10228.html>https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2019-25013</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href=https://linux.oracle.com/cve/CVE-2019-25013.html>https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.netapp.com/advisory/ntap-20210205-0004/ >https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2020-27618</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href=https://linux.oracle.com/cve/CVE-2020-27618.html>https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210401-0006/ >https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2020-29562</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href=https://security.netapp.com/advisory/ntap-20210122-0004/ >https://security.netapp.com/advisory/ntap-20210122-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26923">https://sourceware.org/bugzilla/show_bug.cgi?id=26923</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html>https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2020-6096</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href=https://ubuntu.com/security/notices/USN-4954-1>https://ubuntu.com/security/notices/USN-4954-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2021-27645</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href=https://linux.oracle.com/cve/CVE-2021-27645.html>https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2021-3326</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/01/28/2>http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3326.html>https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210304-0007/ >https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html>https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2021-35942</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href=https://linux.oracle.com/cve/CVE-2021-35942.html>https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0005/ >https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href=https://sourceware.org/glibc/wiki/Security%20Exceptions>https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2022-23218</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23218.html>https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc-bin</td> <td align=center>CVE-2022-23219</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23219.html>https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2021-3999</td> <td align=center>MEDIUM</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3999.html>https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/4>https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2016-10228</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/03/01/10>http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href=http://www.securityfocus.com/bid/96525>http://www.securityfocus.com/bid/96525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href=https://linux.oracle.com/cve/CVE-2016-10228.html>https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2019-25013</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href=https://linux.oracle.com/cve/CVE-2019-25013.html>https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.netapp.com/advisory/ntap-20210205-0004/ >https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2020-27618</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href=https://linux.oracle.com/cve/CVE-2020-27618.html>https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210401-0006/ >https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2020-29562</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href=https://security.netapp.com/advisory/ntap-20210122-0004/ >https://security.netapp.com/advisory/ntap-20210122-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26923">https://sourceware.org/bugzilla/show_bug.cgi?id=26923</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html>https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2020-6096</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href=https://ubuntu.com/security/notices/USN-4954-1>https://ubuntu.com/security/notices/USN-4954-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2021-27645</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href=https://linux.oracle.com/cve/CVE-2021-27645.html>https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2021-3326</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/01/28/2>http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3326.html>https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210304-0007/ >https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html>https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2021-35942</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href=https://linux.oracle.com/cve/CVE-2021-35942.html>https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0005/ >https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href=https://sourceware.org/glibc/wiki/Security%20Exceptions>https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2022-23218</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23218.html>https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc-dev-bin</td> <td align=center>CVE-2022-23219</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23219.html>https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2021-3999</td> <td align=center>MEDIUM</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3999.html>https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/4>https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2016-10228</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/03/01/10>http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href=http://www.securityfocus.com/bid/96525>http://www.securityfocus.com/bid/96525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href=https://linux.oracle.com/cve/CVE-2016-10228.html>https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2019-25013</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href=https://linux.oracle.com/cve/CVE-2019-25013.html>https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.netapp.com/advisory/ntap-20210205-0004/ >https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2020-27618</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href=https://linux.oracle.com/cve/CVE-2020-27618.html>https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210401-0006/ >https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2020-29562</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href=https://security.netapp.com/advisory/ntap-20210122-0004/ >https://security.netapp.com/advisory/ntap-20210122-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26923">https://sourceware.org/bugzilla/show_bug.cgi?id=26923</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html>https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2020-6096</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href=https://ubuntu.com/security/notices/USN-4954-1>https://ubuntu.com/security/notices/USN-4954-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2021-27645</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href=https://linux.oracle.com/cve/CVE-2021-27645.html>https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2021-3326</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/01/28/2>http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3326.html>https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210304-0007/ >https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html>https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2021-35942</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href=https://linux.oracle.com/cve/CVE-2021-35942.html>https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0005/ >https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href=https://sourceware.org/glibc/wiki/Security%20Exceptions>https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2022-23218</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23218.html>https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc6</td> <td align=center>CVE-2022-23219</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23219.html>https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2021-3999</td> <td align=center>MEDIUM</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3999.html>https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/4>https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2016-10228</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/03/01/10>http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href=http://www.securityfocus.com/bid/96525>http://www.securityfocus.com/bid/96525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href=https://linux.oracle.com/cve/CVE-2016-10228.html>https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2019-25013</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href=https://linux.oracle.com/cve/CVE-2019-25013.html>https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.netapp.com/advisory/ntap-20210205-0004/ >https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2020-27618</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href=https://linux.oracle.com/cve/CVE-2020-27618.html>https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210401-0006/ >https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2020-29562</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href=https://security.netapp.com/advisory/ntap-20210122-0004/ >https://security.netapp.com/advisory/ntap-20210122-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26923">https://sourceware.org/bugzilla/show_bug.cgi?id=26923</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html>https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2020-6096</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href=https://ubuntu.com/security/notices/USN-4954-1>https://ubuntu.com/security/notices/USN-4954-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2021-27645</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href=https://linux.oracle.com/cve/CVE-2021-27645.html>https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2021-3326</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/01/28/2>http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3326.html>https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210304-0007/ >https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html>https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2021-35942</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href=https://linux.oracle.com/cve/CVE-2021-35942.html>https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0005/ >https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href=https://sourceware.org/glibc/wiki/Security%20Exceptions>https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2022-23218</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23218.html>https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libc6-dev</td> <td align=center>CVE-2022-23219</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23219.html>https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>libcairo-gobject2</td> <td align=center>CVE-2017-7475</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2017/q2/151>http://seclists.org/oss-sec/2017/q2/151</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=100763">https://bugs.freedesktop.org/show_bug.cgi?id=100763</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475</a><br><a href=https://github.com/advisories/GHSA-5v3f-73gv-x7x5>https://github.com/advisories/GHSA-5v3f-73gv-x7x5</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2017-7475>https://nvd.nist.gov/vuln/detail/CVE-2017-7475</a><br></details></td> </tr> <tr> <td align=left>libcairo-gobject2</td> <td align=center>CVE-2017-9814</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html>http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=101547">https://bugs.freedesktop.org/show_bug.cgi?id=101547</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/201904-01>https://security.gentoo.org/glsa/201904-01</a><br></details></td> </tr> <tr> <td align=left>libcairo-gobject2</td> <td align=center>CVE-2018-18064</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064</a><br><a href=https://gitlab.freedesktop.org/cairo/cairo/issues/341>https://gitlab.freedesktop.org/cairo/cairo/issues/341</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libcairo-gobject2</td> <td align=center>CVE-2019-6461</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461</a><br><a href=https://github.com/TeamSeri0us/pocs/tree/master/gerbv>https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href=https://gitlab.freedesktop.org/cairo/cairo/issues/352>https://gitlab.freedesktop.org/cairo/cairo/issues/352</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libcairo-gobject2</td> <td align=center>CVE-2019-6462</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href=https://github.com/TeamSeri0us/pocs/tree/master/gerbv>https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href=https://gitlab.freedesktop.org/cairo/cairo/issues/353>https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libcairo2</td> <td align=center>CVE-2017-7475</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2017/q2/151>http://seclists.org/oss-sec/2017/q2/151</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=100763">https://bugs.freedesktop.org/show_bug.cgi?id=100763</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475</a><br><a href=https://github.com/advisories/GHSA-5v3f-73gv-x7x5>https://github.com/advisories/GHSA-5v3f-73gv-x7x5</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2017-7475>https://nvd.nist.gov/vuln/detail/CVE-2017-7475</a><br></details></td> </tr> <tr> <td align=left>libcairo2</td> <td align=center>CVE-2017-9814</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html>http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=101547">https://bugs.freedesktop.org/show_bug.cgi?id=101547</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/201904-01>https://security.gentoo.org/glsa/201904-01</a><br></details></td> </tr> <tr> <td align=left>libcairo2</td> <td align=center>CVE-2018-18064</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064</a><br><a href=https://gitlab.freedesktop.org/cairo/cairo/issues/341>https://gitlab.freedesktop.org/cairo/cairo/issues/341</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libcairo2</td> <td align=center>CVE-2019-6461</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461</a><br><a href=https://github.com/TeamSeri0us/pocs/tree/master/gerbv>https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href=https://gitlab.freedesktop.org/cairo/cairo/issues/352>https://gitlab.freedesktop.org/cairo/cairo/issues/352</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libcairo2</td> <td align=center>CVE-2019-6462</td> <td align=center>LOW</td> <td align=center>1.16.0-4ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href=https://github.com/TeamSeri0us/pocs/tree/master/gerbv>https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href=https://gitlab.freedesktop.org/cairo/cairo/issues/353>https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libcryptsetup12</td> <td align=center>CVE-2021-4122</td> <td align=center>MEDIUM</td> <td align=center>2:2.2.2-3ubuntu2.3</td> <td align=center>2:2.2.2-3ubuntu2.4</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4122.html>https://linux.oracle.com/cve/CVE-2021-4122.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0370.html>https://linux.oracle.com/errata/ELSA-2022-0370.html</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5286-1>https://ubuntu.com/security/notices/USN-5286-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/13/2>https://www.openwall.com/lists/oss-security/2022/01/13/2</a><br></details></td> </tr> <tr> <td align=left>libctf-nobfd0</td> <td align=center>CVE-2017-13716</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details></td> </tr> <tr> <td align=left>libctf-nobfd0</td> <td align=center>CVE-2018-20657</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106444>http://www.securityfocus.com/bid/106444</a><br><a href=https://access.redhat.com/errata/RHSA-2019:3352>https://access.redhat.com/errata/RHSA-2019:3352</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539</a><br><a href=https://linux.oracle.com/cve/CVE-2018-20657.html>https://linux.oracle.com/cve/CVE-2018-20657.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-3352.html>https://linux.oracle.com/errata/ELSA-2019-3352.html</a><br><a href=https://support.f5.com/csp/article/K62602089>https://support.f5.com/csp/article/K62602089</a><br></details></td> </tr> <tr> <td align=left>libctf-nobfd0</td> <td align=center>CVE-2019-1010204</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href=https://linux.oracle.com/cve/CVE-2019-1010204.html>https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1797.html>https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href=https://security.netapp.com/advisory/ntap-20190822-0001/ >https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details></td> </tr> <tr> <td align=left>libctf-nobfd0</td> <td align=center>CVE-2020-16592</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210115-0003/ >https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br></details></td> </tr> <tr> <td align=left>libctf-nobfd0</td> <td align=center>CVE-2021-3487</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3487.html>https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4364.html>https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>libctf-nobfd0</td> <td align=center>CVE-2021-45078</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0002/ >https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>libctf0</td> <td align=center>CVE-2017-13716</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22009">https://sourceware.org/bugzilla/show_bug.cgi?id=22009</a><br></details></td> </tr> <tr> <td align=left>libctf0</td> <td align=center>CVE-2018-20657</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106444>http://www.securityfocus.com/bid/106444</a><br><a href=https://access.redhat.com/errata/RHSA-2019:3352>https://access.redhat.com/errata/RHSA-2019:3352</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539</a><br><a href=https://linux.oracle.com/cve/CVE-2018-20657.html>https://linux.oracle.com/cve/CVE-2018-20657.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-3352.html>https://linux.oracle.com/errata/ELSA-2019-3352.html</a><br><a href=https://support.f5.com/csp/article/K62602089>https://support.f5.com/csp/article/K62602089</a><br></details></td> </tr> <tr> <td align=left>libctf0</td> <td align=center>CVE-2019-1010204</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204</a><br><a href=https://linux.oracle.com/cve/CVE-2019-1010204.html>https://linux.oracle.com/cve/CVE-2019-1010204.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1797.html>https://linux.oracle.com/errata/ELSA-2020-1797.html</a><br><a href=https://security.netapp.com/advisory/ntap-20190822-0001/ >https://security.netapp.com/advisory/ntap-20190822-0001/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23765">https://sourceware.org/bugzilla/show_bug.cgi?id=23765</a><br><a href="https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details></td> </tr> <tr> <td align=left>libctf0</td> <td align=center>CVE-2020-16592</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210115-0003/ >https://security.netapp.com/advisory/ntap-20210115-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25823">https://sourceware.org/bugzilla/show_bug.cgi?id=25823</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br></details></td> </tr> <tr> <td align=left>libctf0</td> <td align=center>CVE-2021-3487</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center>2.34-6ubuntu1.3</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1947111">https://bugzilla.redhat.com/show_bug.cgi?id=1947111</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3487.html>https://linux.oracle.com/cve/CVE-2021-3487.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4364.html>https://linux.oracle.com/errata/ELSA-2021-4364.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5124-1>https://ubuntu.com/security/notices/USN-5124-1</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>libctf0</td> <td align=center>CVE-2021-45078</td> <td align=center>LOW</td> <td align=center>2.34-6ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0002/ >https://security.netapp.com/advisory/ntap-20220107-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28694">https://sourceware.org/bugzilla/show_bug.cgi?id=28694</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02</a><br><a href=https://ubuntu.com/security/notices/USN-5341-1>https://ubuntu.com/security/notices/USN-5341-1</a><br></details></td> </tr> <tr> <td align=left>libcups2</td> <td align=center>CVE-2019-8842</td> <td align=center>LOW</td> <td align=center>2.3.1-9ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT210788>https://support.apple.com/en-us/HT210788</a><br></details></td> </tr> <tr> <td align=left>libcups2</td> <td align=center>CVE-2020-10001</td> <td align=center>LOW</td> <td align=center>2.3.1-9ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001</a><br><a href=https://linux.oracle.com/cve/CVE-2020-10001.html>https://linux.oracle.com/cve/CVE-2020-10001.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4393.html>https://linux.oracle.com/errata/ELSA-2021-4393.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html</a><br><a href=https://support.apple.com/en-us/HT212011>https://support.apple.com/en-us/HT212011</a><br></details></td> </tr> <tr> <td align=left>libcurl3-gnutls</td> <td align=center>CVE-2021-22924</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22924.html>https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href=https://hackerone.com/reports/1223565>https://hackerone.com/reports/1223565</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22924.html>https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3582.html>https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl3-gnutls</td> <td align=center>CVE-2021-22925</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2021/Sep/39>http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href=http://seclists.org/fulldisclosure/2021/Sep/40>http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22925.html>https://curl.se/docs/CVE-2021-22925.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925</a><br><a href=https://hackerone.com/reports/1223882>https://hackerone.com/reports/1223882</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22925.html>https://linux.oracle.com/cve/CVE-2021-22925.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://support.apple.com/kb/HT212804>https://support.apple.com/kb/HT212804</a><br><a href=https://support.apple.com/kb/HT212805>https://support.apple.com/kb/HT212805</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl3-gnutls</td> <td align=center>CVE-2021-22946</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.7</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22946.html>https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href=https://hackerone.com/reports/1334111>https://hackerone.com/reports/1334111</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22946.html>https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4059.html>https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0003/ >https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://ubuntu.com/security/notices/USN-5079-1>https://ubuntu.com/security/notices/USN-5079-1</a><br><a href=https://ubuntu.com/security/notices/USN-5079-2>https://ubuntu.com/security/notices/USN-5079-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl3-gnutls</td> <td align=center>CVE-2021-22947</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.7</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22947.html>https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href=https://hackerone.com/reports/1334763>https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22947.html>https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4059.html>https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0003/ >https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://ubuntu.com/security/notices/USN-5079-1>https://ubuntu.com/security/notices/USN-5079-1</a><br><a href=https://ubuntu.com/security/notices/USN-5079-2>https://ubuntu.com/security/notices/USN-5079-2</a><br><a href=https://ubuntu.com/security/notices/USN-5079-3>https://ubuntu.com/security/notices/USN-5079-3</a><br><a href=https://ubuntu.com/security/notices/USN-5079-4>https://ubuntu.com/security/notices/USN-5079-4</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl3-gnutls</td> <td align=center>CVE-2021-22898</td> <td align=center>LOW</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/07/21/4>http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22898.html>https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href=https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde>https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href=https://hackerone.com/reports/1176461>https://hackerone.com/reports/1176461</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22898.html>https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E>https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libcurl4</td> <td align=center>CVE-2021-22924</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22924.html>https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href=https://hackerone.com/reports/1223565>https://hackerone.com/reports/1223565</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22924.html>https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3582.html>https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl4</td> <td align=center>CVE-2021-22925</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2021/Sep/39>http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href=http://seclists.org/fulldisclosure/2021/Sep/40>http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22925.html>https://curl.se/docs/CVE-2021-22925.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925</a><br><a href=https://hackerone.com/reports/1223882>https://hackerone.com/reports/1223882</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22925.html>https://linux.oracle.com/cve/CVE-2021-22925.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://support.apple.com/kb/HT212804>https://support.apple.com/kb/HT212804</a><br><a href=https://support.apple.com/kb/HT212805>https://support.apple.com/kb/HT212805</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl4</td> <td align=center>CVE-2021-22946</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.7</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22946.html>https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href=https://hackerone.com/reports/1334111>https://hackerone.com/reports/1334111</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22946.html>https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4059.html>https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0003/ >https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://ubuntu.com/security/notices/USN-5079-1>https://ubuntu.com/security/notices/USN-5079-1</a><br><a href=https://ubuntu.com/security/notices/USN-5079-2>https://ubuntu.com/security/notices/USN-5079-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl4</td> <td align=center>CVE-2021-22947</td> <td align=center>MEDIUM</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.7</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22947.html>https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href=https://hackerone.com/reports/1334763>https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22947.html>https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4059.html>https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0003/ >https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br><a href=https://ubuntu.com/security/notices/USN-5079-1>https://ubuntu.com/security/notices/USN-5079-1</a><br><a href=https://ubuntu.com/security/notices/USN-5079-2>https://ubuntu.com/security/notices/USN-5079-2</a><br><a href=https://ubuntu.com/security/notices/USN-5079-3>https://ubuntu.com/security/notices/USN-5079-3</a><br><a href=https://ubuntu.com/security/notices/USN-5079-4>https://ubuntu.com/security/notices/USN-5079-4</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libcurl4</td> <td align=center>CVE-2021-22898</td> <td align=center>LOW</td> <td align=center>7.68.0-1ubuntu2.5</td> <td align=center>7.68.0-1ubuntu2.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/07/21/4>http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22898.html>https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href=https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde>https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href=https://hackerone.com/reports/1176461>https://hackerone.com/reports/1176461</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22898.html>https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E>https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libdbus-1-3</td> <td align=center>CVE-2020-35512</td> <td align=center>LOW</td> <td align=center>1.12.16-2ubuntu2.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.gentoo.org/755392>https://bugs.gentoo.org/755392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1909101">https://bugzilla.redhat.com/show_bug.cgi?id=1909101</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305</a><br><a href=https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128>https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2020-35512>https://security-tracker.debian.org/tracker/CVE-2020-35512</a><br><a href=https://ubuntu.com/security/notices/USN-5244-1>https://ubuntu.com/security/notices/USN-5244-1</a><br></details></td> </tr> <tr> <td align=left>libexempi8</td> <td align=center>CVE-2018-12648</td> <td align=center>LOW</td> <td align=center>2.5.1-1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00070.html>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00070.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00075.html>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00075.html</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=106981">https://bugs.freedesktop.org/show_bug.cgi?id=106981</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12648</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-32815</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32815">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32815</a><br><a href=https://github.com/Exiv2/exiv2/pull/1739>https://github.com/Exiv2/exiv2/pull/1739</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m>https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-34334</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34334">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34334</a><br><a href=https://github.com/Exiv2/exiv2/pull/1766>https://github.com/Exiv2/exiv2/pull/1766</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p>https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-34335</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34335">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34335</a><br><a href=https://github.com/Exiv2/exiv2/pull/1750>https://github.com/Exiv2/exiv2/pull/1750</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984>https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37615</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37615">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37615</a><br><a href=https://github.com/Exiv2/exiv2/pull/1758>https://github.com/Exiv2/exiv2/pull/1758</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w>https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37616</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37616</a><br><a href=https://github.com/Exiv2/exiv2/pull/1758>https://github.com/Exiv2/exiv2/pull/1758</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w>https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37618</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37618</a><br><a href=https://github.com/Exiv2/exiv2/pull/1759>https://github.com/Exiv2/exiv2/pull/1759</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2>https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2</a><br><a href=https://linux.oracle.com/cve/CVE-2021-37618.html>https://linux.oracle.com/cve/CVE-2021-37618.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4319.html>https://linux.oracle.com/errata/ELSA-2021-4319.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37619</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37619</a><br><a href=https://github.com/Exiv2/exiv2/pull/1752>https://github.com/Exiv2/exiv2/pull/1752</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v>https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v</a><br><a href=https://linux.oracle.com/cve/CVE-2021-37619.html>https://linux.oracle.com/cve/CVE-2021-37619.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4319.html>https://linux.oracle.com/errata/ELSA-2021-4319.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37620</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620</a><br><a href=https://github.com/Exiv2/exiv2/pull/1769>https://github.com/Exiv2/exiv2/pull/1769</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728>https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br><a href=https://ubuntu.com/security/notices/USN-5043-2>https://ubuntu.com/security/notices/USN-5043-2</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37621</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37621</a><br><a href=https://github.com/Exiv2/exiv2/pull/1778>https://github.com/Exiv2/exiv2/pull/1778</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg>https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37622</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37622">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37622</a><br><a href=https://github.com/Exiv2/exiv2/pull/1788>https://github.com/Exiv2/exiv2/pull/1788</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv>https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexiv2-27</td> <td align=center>CVE-2021-37623</td> <td align=center>MEDIUM</td> <td align=center>0.27.2-8ubuntu2.4</td> <td align=center>0.27.2-8ubuntu2.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37623">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37623</a><br><a href=https://github.com/Exiv2/exiv2/pull/1790>https://github.com/Exiv2/exiv2/pull/1790</a><br><a href=https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq>https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/</a><br><a href=https://ubuntu.com/security/notices/USN-5043-1>https://ubuntu.com/security/notices/USN-5043-1</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-25235</td> <td align=center>HIGH</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/19/1>http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href=https://blog.hartwork.org/posts/expat-2-4-5-released/ >https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href=https://github.com/libexpat/libexpat/pull/562>https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href=https://linux.oracle.com/cve/CVE-2022-25235.html>https://linux.oracle.com/cve/CVE-2022-25235.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220303-0008/ >https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5085>https://www.debian.org/security/2022/dsa-5085</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-25236</td> <td align=center>HIGH</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/19/1>http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href=https://blog.hartwork.org/posts/expat-2-4-5-released/ >https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href=https://github.com/libexpat/libexpat/pull/561>https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href=https://github.com/libexpat/libexpat/pull/577>https://github.com/libexpat/libexpat/pull/577</a><br><a href=https://linux.oracle.com/cve/CVE-2022-25236.html>https://linux.oracle.com/cve/CVE-2022-25236.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220303-0008/ >https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5085>https://www.debian.org/security/2022/dsa-5085</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2021-46143</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143</a><br><a href=https://github.com/libexpat/libexpat/issues/532>https://github.com/libexpat/libexpat/issues/532</a><br><a href=https://github.com/libexpat/libexpat/pull/538>https://github.com/libexpat/libexpat/pull/538</a><br><a href=https://linux.oracle.com/cve/CVE-2021-46143.html>https://linux.oracle.com/cve/CVE-2021-46143.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9227.html>https://linux.oracle.com/errata/ELSA-2022-9227.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0006/ >https://security.netapp.com/advisory/ntap-20220121-0006/</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-22822</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822</a><br><a href=https://github.com/libexpat/libexpat/pull/539>https://github.com/libexpat/libexpat/pull/539</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22822.html>https://linux.oracle.com/cve/CVE-2022-22822.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-22823</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823</a><br><a href=https://github.com/libexpat/libexpat/pull/539>https://github.com/libexpat/libexpat/pull/539</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22823.html>https://linux.oracle.com/cve/CVE-2022-22823.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-22824</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824</a><br><a href=https://github.com/libexpat/libexpat/pull/539>https://github.com/libexpat/libexpat/pull/539</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22824.html>https://linux.oracle.com/cve/CVE-2022-22824.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-22825</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825</a><br><a href=https://github.com/libexpat/libexpat/pull/539>https://github.com/libexpat/libexpat/pull/539</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22825.html>https://linux.oracle.com/cve/CVE-2022-22825.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-22826</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826</a><br><a href=https://github.com/libexpat/libexpat/pull/539>https://github.com/libexpat/libexpat/pull/539</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22826.html>https://linux.oracle.com/cve/CVE-2022-22826.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-22827</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827</a><br><a href=https://github.com/libexpat/libexpat/pull/539>https://github.com/libexpat/libexpat/pull/539</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22827.html>https://linux.oracle.com/cve/CVE-2022-22827.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-23852</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852</a><br><a href=https://github.com/libexpat/libexpat/pull/550>https://github.com/libexpat/libexpat/pull/550</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23852.html>https://linux.oracle.com/cve/CVE-2022-23852.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220217-0001/ >https://security.netapp.com/advisory/ntap-20220217-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-23990</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990</a><br><a href=https://github.com/libexpat/libexpat/pull/551>https://github.com/libexpat/libexpat/pull/551</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23990.html>https://linux.oracle.com/cve/CVE-2022-23990.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9232.html>https://linux.oracle.com/errata/ELSA-2022-9232.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-25313</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/19/1>http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href=https://blog.hartwork.org/posts/expat-2-4-5-released/ >https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313</a><br><a href=https://github.com/libexpat/libexpat/pull/558>https://github.com/libexpat/libexpat/pull/558</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220303-0008/ >https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5320-1>https://ubuntu.com/security/notices/USN-5320-1</a><br><a href=https://www.debian.org/security/2022/dsa-5085>https://www.debian.org/security/2022/dsa-5085</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-25314</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/19/1>http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href=https://blog.hartwork.org/posts/expat-2-4-5-released/ >https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314</a><br><a href=https://github.com/libexpat/libexpat/pull/560>https://github.com/libexpat/libexpat/pull/560</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220303-0008/ >https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5320-1>https://ubuntu.com/security/notices/USN-5320-1</a><br><a href=https://www.debian.org/security/2022/dsa-5085>https://www.debian.org/security/2022/dsa-5085</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2022-25315</td> <td align=center>MEDIUM</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/19/1>http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href=https://blog.hartwork.org/posts/expat-2-4-5-released/ >https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315</a><br><a href=https://github.com/libexpat/libexpat/pull/559>https://github.com/libexpat/libexpat/pull/559</a><br><a href=https://linux.oracle.com/cve/CVE-2022-25315.html>https://linux.oracle.com/cve/CVE-2022-25315.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220303-0008/ >https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5320-1>https://ubuntu.com/security/notices/USN-5320-1</a><br><a href=https://www.debian.org/security/2022/dsa-5085>https://www.debian.org/security/2022/dsa-5085</a><br></details></td> </tr> <tr> <td align=left>libexpat1</td> <td align=center>CVE-2021-45960</td> <td align=center>LOW</td> <td align=center>2.2.9-1build1</td> <td align=center>2.2.9-1ubuntu0.2</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/17/3>http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1217609">https://bugzilla.mozilla.org/show_bug.cgi?id=1217609</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960</a><br><a href=https://github.com/libexpat/libexpat/issues/531>https://github.com/libexpat/libexpat/issues/531</a><br><a href=https://github.com/libexpat/libexpat/pull/534>https://github.com/libexpat/libexpat/pull/534</a><br><a href=https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea>https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea</a><br><a href=https://linux.oracle.com/cve/CVE-2021-45960.html>https://linux.oracle.com/cve/CVE-2021-45960.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0951.html>https://linux.oracle.com/errata/ELSA-2022-0951.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0004/ >https://security.netapp.com/advisory/ntap-20220121-0004/</a><br><a href=https://ubuntu.com/security/notices/USN-5288-1>https://ubuntu.com/security/notices/USN-5288-1</a><br><a href=https://www.debian.org/security/2022/dsa-5073>https://www.debian.org/security/2022/dsa-5073</a><br><a href=https://www.tenable.com/security/tns-2022-05>https://www.tenable.com/security/tns-2022-05</a><br></details></td> </tr> <tr> <td align=left>libfdisk1</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libfdisk1</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libflac8</td> <td align=center>CVE-2020-0499</td> <td align=center>LOW</td> <td align=center>1.3.3-1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0>https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/</a><br><a href=https://source.android.com/security/bulletin/pixel/2020-12-01>https://source.android.com/security/bulletin/pixel/2020-12-01</a><br></details></td> </tr> <tr> <td align=left>libgcc-8-dev</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>libgcc-9-dev</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>libgcrypt20</td> <td align=center>CVE-2021-40528</td> <td align=center>MEDIUM</td> <td align=center>1.8.5-5ubuntu1</td> <td align=center>1.8.5-5ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528</a><br><a href=https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13>https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13</a><br><a href=https://eprint.iacr.org/2021/923>https://eprint.iacr.org/2021/923</a><br><a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320">https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320</a><br><a href=https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1>https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1</a><br><a href=https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2>https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2</a><br><a href=https://ubuntu.com/security/notices/USN-5080-1>https://ubuntu.com/security/notices/USN-5080-1</a><br><a href=https://ubuntu.com/security/notices/USN-5080-2>https://ubuntu.com/security/notices/USN-5080-2</a><br></details></td> </tr> <tr> <td align=left>libgcrypt20</td> <td align=center>CVE-2021-33560</td> <td align=center>LOW</td> <td align=center>1.8.5-5ubuntu1</td> <td align=center>1.8.5-5ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href=https://dev.gnupg.org/T5305>https://dev.gnupg.org/T5305</a><br><a href=https://dev.gnupg.org/T5328>https://dev.gnupg.org/T5328</a><br><a href=https://dev.gnupg.org/T5466>https://dev.gnupg.org/T5466</a><br><a href=https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61>https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href=https://eprint.iacr.org/2021/923>https://eprint.iacr.org/2021/923</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33560.html>https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4409.html>https://linux.oracle.com/errata/ELSA-2021-4409.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href=https://ubuntu.com/security/notices/USN-5080-1>https://ubuntu.com/security/notices/USN-5080-1</a><br><a href=https://ubuntu.com/security/notices/USN-5080-2>https://ubuntu.com/security/notices/USN-5080-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libgd3</td> <td align=center>CVE-2021-40145</td> <td align=center>MEDIUM</td> <td align=center>2.2.5-5.2ubuntu2</td> <td align=center>2.2.5-5.2ubuntu2.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145</a><br><a href=https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af>https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af</a><br><a href=https://github.com/libgd/libgd/issues/700>https://github.com/libgd/libgd/issues/700</a><br><a href=https://github.com/libgd/libgd/pull/713>https://github.com/libgd/libgd/pull/713</a><br><a href=https://ubuntu.com/security/notices/USN-5068-1>https://ubuntu.com/security/notices/USN-5068-1</a><br></details></td> </tr> <tr> <td align=left>libgd3</td> <td align=center>CVE-2017-6363</td> <td align=center>LOW</td> <td align=center>2.2.5-5.2ubuntu2</td> <td align=center>2.2.5-5.2ubuntu2.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363</a><br><a href=https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c>https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c</a><br><a href=https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397>https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397</a><br><a href=https://github.com/libgd/libgd/issues/383>https://github.com/libgd/libgd/issues/383</a><br><a href=https://ubuntu.com/security/notices/USN-5068-1>https://ubuntu.com/security/notices/USN-5068-1</a><br></details></td> </tr> <tr> <td align=left>libgd3</td> <td align=center>CVE-2021-38115</td> <td align=center>LOW</td> <td align=center>2.2.5-5.2ubuntu2</td> <td align=center>2.2.5-5.2ubuntu2.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115</a><br><a href=https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032>https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032</a><br><a href=https://github.com/libgd/libgd/issues/697>https://github.com/libgd/libgd/issues/697</a><br><a href=https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032>https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032</a><br><a href=https://ubuntu.com/security/notices/USN-5068-1>https://ubuntu.com/security/notices/USN-5068-1</a><br></details></td> </tr> <tr> <td align=left>libgd3</td> <td align=center>CVE-2021-40812</td> <td align=center>LOW</td> <td align=center>2.2.5-5.2ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812</a><br><a href=https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9>https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9</a><br><a href=https://github.com/libgd/libgd/issues/750#issuecomment-914872385>https://github.com/libgd/libgd/issues/750#issuecomment-914872385</a><br><a href=https://github.com/libgd/libgd/issues/757>https://github.com/libgd/libgd/issues/757</a><br></details></td> </tr> <tr> <td align=left>libgdk-pixbuf2.0-0</td> <td align=center>CVE-2021-44648</td> <td align=center>MEDIUM</td> <td align=center>2.40.0+dfsg-3ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648</a><br><a href=https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136>https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/</a><br><a href=https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ >https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/</a><br></details></td> </tr> <tr> <td align=left>libgdk-pixbuf2.0-common</td> <td align=center>CVE-2021-44648</td> <td align=center>MEDIUM</td> <td align=center>2.40.0+dfsg-3ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648</a><br><a href=https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136>https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/</a><br><a href=https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ >https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/</a><br></details></td> </tr> <tr> <td align=left>libgfortran-8-dev</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>libgif7</td> <td align=center>CVE-2020-23922</td> <td align=center>LOW</td> <td align=center>5.1.9-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922</a><br><a href=https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E>https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E>https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href=https://sourceforge.net/p/giflib/bugs/151/ >https://sourceforge.net/p/giflib/bugs/151/</a><br></details></td> </tr> <tr> <td align=left>libgmp10</td> <td align=center>CVE-2021-43618</td> <td align=center>LOW</td> <td align=center>2:6.2.0+dfsg-4</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.debian.org/994405>https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href=https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html>https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href=https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e>https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br></details></td> </tr> <tr> <td align=left>libgnutls30</td> <td align=center>CVE-2021-20231</td> <td align=center>LOW</td> <td align=center>3.6.13-2ubuntu1.3</td> <td align=center>3.6.13-2ubuntu1.6</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922276">https://bugzilla.redhat.com/show_bug.cgi?id=1922276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231</a><br><a href=https://linux.oracle.com/cve/CVE-2021-20231.html>https://linux.oracle.com/cve/CVE-2021-20231.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9221.html>https://linux.oracle.com/errata/ELSA-2022-9221.html</a><br><a href=https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/</a><br><a href=https://security.netapp.com/advisory/ntap-20210416-0005/ >https://security.netapp.com/advisory/ntap-20210416-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5029-1>https://ubuntu.com/security/notices/USN-5029-1</a><br><a href=https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10>https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10</a><br></details></td> </tr> <tr> <td align=left>libgnutls30</td> <td align=center>CVE-2021-20232</td> <td align=center>LOW</td> <td align=center>3.6.13-2ubuntu1.3</td> <td align=center>3.6.13-2ubuntu1.6</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922275">https://bugzilla.redhat.com/show_bug.cgi?id=1922275</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232</a><br><a href=https://linux.oracle.com/cve/CVE-2021-20232.html>https://linux.oracle.com/cve/CVE-2021-20232.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9221.html>https://linux.oracle.com/errata/ELSA-2022-9221.html</a><br><a href=https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E>https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/</a><br><a href=https://security.netapp.com/advisory/ntap-20210416-0005/ >https://security.netapp.com/advisory/ntap-20210416-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5029-1>https://ubuntu.com/security/notices/USN-5029-1</a><br><a href=https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10>https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10</a><br></details></td> </tr> <tr> <td align=left>libgssapi-krb5-2</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libgssapi-krb5-2</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libgssapi3-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libgssrpc4</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libgssrpc4</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libgxps2</td> <td align=center>CVE-2018-10767</td> <td align=center>LOW</td> <td align=center>0.3.1-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/errata/RHBA-2019:0327>https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href=https://access.redhat.com/errata/RHSA-2018:3140>https://access.redhat.com/errata/RHSA-2018:3140</a><br><a href=https://access.redhat.com/errata/RHSA-2018:3505>https://access.redhat.com/errata/RHSA-2018:3505</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1575188">https://bugzilla.redhat.com/show_bug.cgi?id=1575188</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767</a><br><a href=https://linux.oracle.com/cve/CVE-2018-10767.html>https://linux.oracle.com/cve/CVE-2018-10767.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2018-3140.html>https://linux.oracle.com/errata/ELSA-2018-3140.html</a><br></details></td> </tr> <tr> <td align=left>libhcrypto4-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2017-17507</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507</a><br><a href=https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md</a><br><a href=https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17233</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17234</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17432</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17433</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17434</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17437</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2018-17438</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2019-8397</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul5>https://github.com/magicSwordsMan/PAAFS/tree/master/vul5</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2019-9151</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul7>https://github.com/magicSwordsMan/PAAFS/tree/master/vul7</a><br></details></td> </tr> <tr> <td align=left>libhdf5-103</td> <td align=center>CVE-2019-9152</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul8>https://github.com/magicSwordsMan/PAAFS/tree/master/vul8</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2017-17507</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507</a><br><a href=https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md</a><br><a href=https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17233</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17234</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17432</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17433</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17434</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17437</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2018-17438</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2019-8397</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul5>https://github.com/magicSwordsMan/PAAFS/tree/master/vul5</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2019-9151</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul7>https://github.com/magicSwordsMan/PAAFS/tree/master/vul7</a><br></details></td> </tr> <tr> <td align=left>libhdf5-cpp-103</td> <td align=center>CVE-2019-9152</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul8>https://github.com/magicSwordsMan/PAAFS/tree/master/vul8</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2017-17507</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507</a><br><a href=https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md</a><br><a href=https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md>https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17233</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17234</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17432</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17433</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17434</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17437</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2018-17438</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438</a><br><a href=https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect>https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2019-8397</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul5>https://github.com/magicSwordsMan/PAAFS/tree/master/vul5</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2019-9151</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul7>https://github.com/magicSwordsMan/PAAFS/tree/master/vul7</a><br></details></td> </tr> <tr> <td align=left>libhdf5-dev</td> <td align=center>CVE-2019-9152</td> <td align=center>MEDIUM</td> <td align=center>1.10.4+repack-11ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152</a><br><a href=https://github.com/magicSwordsMan/PAAFS/tree/master/vul8>https://github.com/magicSwordsMan/PAAFS/tree/master/vul8</a><br></details></td> </tr> <tr> <td align=left>libheimbase1-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libheimntlm0-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libhx509-5-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libicu66</td> <td align=center>CVE-2021-30535</td> <td align=center>MEDIUM</td> <td align=center>66.1-2ubuntu2</td> <td align=center>66.1-2ubuntu2.1</td> <td><details><summary>Expand...</summary><a href=https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html>https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html</a><br><a href=https://crbug.com/1194899>https://crbug.com/1194899</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535</a><br><a href=https://github.com/unicode-org/icu/pull/1698>https://github.com/unicode-org/icu/pull/1698</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/</a><br><a href=https://ubuntu.com/security/notices/USN-5156-1>https://ubuntu.com/security/notices/USN-5156-1</a><br></details></td> </tr> <tr> <td align=left>libjbig-dev</td> <td align=center>CVE-2017-9937</td> <td align=center>LOW</td> <td align=center>2.1-3.1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2707">http://bugzilla.maptools.org/show_bug.cgi?id=2707</a><br><a href=http://www.securityfocus.com/bid/99304>http://www.securityfocus.com/bid/99304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libjbig0</td> <td align=center>CVE-2017-9937</td> <td align=center>LOW</td> <td align=center>2.1-3.1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2707">http://bugzilla.maptools.org/show_bug.cgi?id=2707</a><br><a href=http://www.securityfocus.com/bid/99304>http://www.securityfocus.com/bid/99304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libjpeg-turbo8</td> <td align=center>CVE-2020-17541</td> <td align=center>LOW</td> <td align=center>2.0.3-0ubuntu1.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541</a><br><a href=https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392>https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17541.html>https://linux.oracle.com/cve/CVE-2020-17541.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4288.html>https://linux.oracle.com/errata/ELSA-2021-4288.html</a><br></details></td> </tr> <tr> <td align=left>libjpeg-turbo8-dev</td> <td align=center>CVE-2020-17541</td> <td align=center>LOW</td> <td align=center>2.0.3-0ubuntu1.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541</a><br><a href=https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392>https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17541.html>https://linux.oracle.com/cve/CVE-2020-17541.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4288.html>https://linux.oracle.com/errata/ELSA-2021-4288.html</a><br></details></td> </tr> <tr> <td align=left>libk5crypto3</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libk5crypto3</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libkadm5clnt-mit11</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libkadm5clnt-mit11</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libkadm5srv-mit11</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libkadm5srv-mit11</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libkdb5-9</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libkdb5-9</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libkrb5-26-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libkrb5-3</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libkrb5-3</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libkrb5-dev</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libkrb5-dev</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libkrb5support0</td> <td align=center>CVE-2021-36222</td> <td align=center>MEDIUM</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href=https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562>https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href=https://github.com/krb5/krb5/releases>https://github.com/krb5/krb5/releases</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36222.html>https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3576.html>https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0007/ >https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href=https://web.mit.edu/kerberos/advisories/ >https://web.mit.edu/kerberos/advisories/</a><br><a href=https://www.debian.org/security/2021/dsa-4944>https://www.debian.org/security/2021/dsa-4944</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libkrb5support0</td> <td align=center>CVE-2018-5709</td> <td align=center>LOW</td> <td align=center>1.17-6ubuntu4.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a><br><a href=https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow>https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>liblapack-dev</td> <td align=center>CVE-2021-4048</td> <td align=center>LOW</td> <td align=center>3.9.0-1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048</a><br><a href=https://github.com/JuliaLang/julia/issues/42415>https://github.com/JuliaLang/julia/issues/42415</a><br><a href=https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781>https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781</a><br><a href=https://github.com/Reference-LAPACK/lapack/pull/625>https://github.com/Reference-LAPACK/lapack/pull/625</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c>https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41>https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7>https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7>https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/</a><br></details></td> </tr> <tr> <td align=left>liblapack3</td> <td align=center>CVE-2021-4048</td> <td align=center>LOW</td> <td align=center>3.9.0-1build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048</a><br><a href=https://github.com/JuliaLang/julia/issues/42415>https://github.com/JuliaLang/julia/issues/42415</a><br><a href=https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781>https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781</a><br><a href=https://github.com/Reference-LAPACK/lapack/pull/625>https://github.com/Reference-LAPACK/lapack/pull/625</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c>https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41>https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7>https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7</a><br><a href=https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7>https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/</a><br></details></td> </tr> <tr> <td align=left>liblept5</td> <td align=center>CVE-2020-36278</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842>https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>liblept5</td> <td align=center>CVE-2020-36279</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4>https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>liblept5</td> <td align=center>CVE-2020-36280</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c>https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>liblept5</td> <td align=center>CVE-2020-36281</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5>https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>libleptonica-dev</td> <td align=center>CVE-2020-36278</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842>https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>libleptonica-dev</td> <td align=center>CVE-2020-36279</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4>https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>libleptonica-dev</td> <td align=center>CVE-2020-36280</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c>https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>libleptonica-dev</td> <td align=center>CVE-2020-36281</td> <td align=center>MEDIUM</td> <td align=center>1.79.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281</a><br><a href=https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5>https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5</a><br><a href=https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0>https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/</a><br><a href=https://security.gentoo.org/glsa/202107-53>https://security.gentoo.org/glsa/202107-53</a><br></details></td> </tr> <tr> <td align=left>libmount1</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libmount1</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libmpx2</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>8.4.0-3ubuntu2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2339</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2339.html>https://linux.oracle.com/cve/CVE-2021-2339.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2340</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2340.html>https://linux.oracle.com/cve/CVE-2021-2340.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2342</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2342.html>https://linux.oracle.com/cve/CVE-2021-2342.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2352</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2352.html>https://linux.oracle.com/cve/CVE-2021-2352.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2354</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2354.html>https://linux.oracle.com/cve/CVE-2021-2354.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2356</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2356.html>https://linux.oracle.com/cve/CVE-2021-2356.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2357</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2357.html>https://linux.oracle.com/cve/CVE-2021-2357.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2367</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2367.html>https://linux.oracle.com/cve/CVE-2021-2367.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2370</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2370.html>https://linux.oracle.com/cve/CVE-2021-2370.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2372</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2372.html>https://linux.oracle.com/cve/CVE-2021-2372.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-2>https://ubuntu.com/security/notices/USN-5022-2</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2374</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2374.html>https://linux.oracle.com/cve/CVE-2021-2374.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2383</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2383.html>https://linux.oracle.com/cve/CVE-2021-2383.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2384</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2384.html>https://linux.oracle.com/cve/CVE-2021-2384.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2385</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2385.html>https://linux.oracle.com/cve/CVE-2021-2385.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2387</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2387.html>https://linux.oracle.com/cve/CVE-2021-2387.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2389</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2389.html>https://linux.oracle.com/cve/CVE-2021-2389.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-2>https://ubuntu.com/security/notices/USN-5022-2</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-880/ >https://www.zerodayinitiative.com/advisories/ZDI-21-880/</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2390</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2390.html>https://linux.oracle.com/cve/CVE-2021-2390.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-881/ >https://www.zerodayinitiative.com/advisories/ZDI-21-881/</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2399</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2399.html>https://linux.oracle.com/cve/CVE-2021-2399.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2402</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2402.html>https://linux.oracle.com/cve/CVE-2021-2402.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2410</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2410.html>https://linux.oracle.com/cve/CVE-2021-2410.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2417</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2417.html>https://linux.oracle.com/cve/CVE-2021-2417.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2418</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2418.html>https://linux.oracle.com/cve/CVE-2021-2418.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2422</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2422.html>https://linux.oracle.com/cve/CVE-2021-2422.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2424</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2424.html>https://linux.oracle.com/cve/CVE-2021-2424.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2425</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2425.html>https://linux.oracle.com/cve/CVE-2021-2425.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2426</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2426.html>https://linux.oracle.com/cve/CVE-2021-2426.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2427</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2427.html>https://linux.oracle.com/cve/CVE-2021-2427.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2429</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2429.html>https://linux.oracle.com/cve/CVE-2021-2429.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-889/ >https://www.zerodayinitiative.com/advisories/ZDI-21-889/</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2437</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2437.html>https://linux.oracle.com/cve/CVE-2021-2437.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2440</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2440.html>https://linux.oracle.com/cve/CVE-2021-2440.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2441</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2441.html>https://linux.oracle.com/cve/CVE-2021-2441.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2471</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-2471>https://nvd.nist.gov/vuln/detail/CVE-2021-2471</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2478</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2479</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-2481</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35537</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35546</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35575</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35577</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35583</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35584</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35591</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35596</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35597</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0005/ >https://security.netapp.com/advisory/ntap-20211022-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35602</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35604</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://ubuntu.com/security/notices/USN-5123-2>https://ubuntu.com/security/notices/USN-5123-2</a><br><a href=https://ubuntu.com/security/notices/USN-5170-1>https://ubuntu.com/security/notices/USN-5170-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35607</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35608</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35610</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35612</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35613</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35622</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35623</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35624</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://ubuntu.com/security/notices/USN-5123-2>https://ubuntu.com/security/notices/USN-5123-2</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35625</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35626</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35627</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35628</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35629</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35630</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35631</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35632</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35633</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35634</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35635</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35636</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35637</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35638</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35639</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35640</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35641</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35642</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35643</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35644</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35645</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35646</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35647</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-35648</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2021-46322</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322</a><br><a href=https://github.com/svaarala/duktape/issues/2448>https://github.com/svaarala/duktape/issues/2448</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21245</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21249</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21253</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21254</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21256</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21264</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21265</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21270</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21278</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21297</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21301</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21302</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21303</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21304</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21339</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21342</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21344</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21348</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21351</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21352</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21358</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21362</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21367</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21368</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21370</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21372</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21374</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21378</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient-dev</td> <td align=center>CVE-2022-21379</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2339</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2339.html>https://linux.oracle.com/cve/CVE-2021-2339.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2340</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2340.html>https://linux.oracle.com/cve/CVE-2021-2340.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2342</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2342.html>https://linux.oracle.com/cve/CVE-2021-2342.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2352</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2352.html>https://linux.oracle.com/cve/CVE-2021-2352.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2354</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2354.html>https://linux.oracle.com/cve/CVE-2021-2354.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2356</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2356.html>https://linux.oracle.com/cve/CVE-2021-2356.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2357</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2357.html>https://linux.oracle.com/cve/CVE-2021-2357.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2367</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2367.html>https://linux.oracle.com/cve/CVE-2021-2367.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2370</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2370.html>https://linux.oracle.com/cve/CVE-2021-2370.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2372</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2372.html>https://linux.oracle.com/cve/CVE-2021-2372.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-2>https://ubuntu.com/security/notices/USN-5022-2</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2374</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2374.html>https://linux.oracle.com/cve/CVE-2021-2374.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2383</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2383.html>https://linux.oracle.com/cve/CVE-2021-2383.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2384</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2384.html>https://linux.oracle.com/cve/CVE-2021-2384.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2385</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2385.html>https://linux.oracle.com/cve/CVE-2021-2385.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2387</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2387.html>https://linux.oracle.com/cve/CVE-2021-2387.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2389</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2389.html>https://linux.oracle.com/cve/CVE-2021-2389.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-2>https://ubuntu.com/security/notices/USN-5022-2</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-880/ >https://www.zerodayinitiative.com/advisories/ZDI-21-880/</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2390</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2390.html>https://linux.oracle.com/cve/CVE-2021-2390.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://ubuntu.com/security/notices/USN-5022-3>https://ubuntu.com/security/notices/USN-5022-3</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-881/ >https://www.zerodayinitiative.com/advisories/ZDI-21-881/</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2399</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2399.html>https://linux.oracle.com/cve/CVE-2021-2399.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2402</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2402.html>https://linux.oracle.com/cve/CVE-2021-2402.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2410</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2410.html>https://linux.oracle.com/cve/CVE-2021-2410.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2417</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2417.html>https://linux.oracle.com/cve/CVE-2021-2417.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2418</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2418.html>https://linux.oracle.com/cve/CVE-2021-2418.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2422</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2422.html>https://linux.oracle.com/cve/CVE-2021-2422.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2424</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2424.html>https://linux.oracle.com/cve/CVE-2021-2424.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2425</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2425.html>https://linux.oracle.com/cve/CVE-2021-2425.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2426</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2426.html>https://linux.oracle.com/cve/CVE-2021-2426.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2427</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2427.html>https://linux.oracle.com/cve/CVE-2021-2427.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2429</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2429.html>https://linux.oracle.com/cve/CVE-2021-2429.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-889/ >https://www.zerodayinitiative.com/advisories/ZDI-21-889/</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2437</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2437.html>https://linux.oracle.com/cve/CVE-2021-2437.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2440</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2440.html>https://linux.oracle.com/cve/CVE-2021-2440.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2441</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441</a><br><a href=https://linux.oracle.com/cve/CVE-2021-2441.html>https://linux.oracle.com/cve/CVE-2021-2441.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3590.html>https://linux.oracle.com/errata/ELSA-2021-3590.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5022-1>https://ubuntu.com/security/notices/USN-5022-1</a><br><a href=https://www.oracle.com/security-alerts/cpujul2021.html>https://www.oracle.com/security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2471</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-2471>https://nvd.nist.gov/vuln/detail/CVE-2021-2471</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2478</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2479</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-2481</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35537</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35546</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35575</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35577</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35583</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35584</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35591</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35596</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35597</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0005/ >https://security.netapp.com/advisory/ntap-20211022-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35602</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35604</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://ubuntu.com/security/notices/USN-5123-2>https://ubuntu.com/security/notices/USN-5123-2</a><br><a href=https://ubuntu.com/security/notices/USN-5170-1>https://ubuntu.com/security/notices/USN-5170-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35607</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35608</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35610</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35612</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35613</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35622</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35623</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35624</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://ubuntu.com/security/notices/USN-5123-2>https://ubuntu.com/security/notices/USN-5123-2</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35625</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35626</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35627</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35628</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35629</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.26-0ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35630</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35631</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35632</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35633</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35634</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35635</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35636</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35637</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35638</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35639</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35640</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35641</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35642</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35643</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35644</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35645</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35646</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35647</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-35648</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5123-1>https://ubuntu.com/security/notices/USN-5123-1</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2021-46322</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322</a><br><a href=https://github.com/svaarala/duktape/issues/2448>https://github.com/svaarala/duktape/issues/2448</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21245</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21249</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21253</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21254</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21256</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21264</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21265</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21270</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21278</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21297</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21301</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21302</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21303</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21304</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21339</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21342</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21344</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21348</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21351</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21352</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.27-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21358</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21362</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21367</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://ubuntu.com/security/notices/USN-5270-2>https://ubuntu.com/security/notices/USN-5270-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21368</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21370</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21372</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21374</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21378</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libmysqlclient21</td> <td align=center>CVE-2022-21379</td> <td align=center>MEDIUM</td> <td align=center>8.0.25-0ubuntu0.20.04.1</td> <td align=center>8.0.28-0ubuntu0.20.04.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0008/ >https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5270-1>https://ubuntu.com/security/notices/USN-5270-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libnss3</td> <td align=center>CVE-2021-43527</td> <td align=center>HIGH</td> <td align=center>2:3.49.1-1ubuntu1.5</td> <td align=center>2:3.49.1-1ubuntu1.6</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1737470">https://bugzilla.mozilla.org/show_bug.cgi?id=1737470</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527</a><br><a href=https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/ >https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/</a><br><a href=https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/ >https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/</a><br><a href=https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html>https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html</a><br><a href=https://linux.oracle.com/cve/CVE-2021-43527.html>https://linux.oracle.com/cve/CVE-2021-43527.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9591.html>https://linux.oracle.com/errata/ELSA-2021-9591.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211229-0002/ >https://security.netapp.com/advisory/ntap-20211229-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5168-1>https://ubuntu.com/security/notices/USN-5168-1</a><br><a href=https://ubuntu.com/security/notices/USN-5168-2>https://ubuntu.com/security/notices/USN-5168-2</a><br><a href=https://ubuntu.com/security/notices/USN-5168-3>https://ubuntu.com/security/notices/USN-5168-3</a><br><a href=https://ubuntu.com/security/notices/USN-5168-4>https://ubuntu.com/security/notices/USN-5168-4</a><br><a href=https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/ >https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/</a><br><a href=https://www.mozilla.org/security/advisories/mfsa2021-51/ >https://www.mozilla.org/security/advisories/mfsa2021-51/</a><br></details></td> </tr> <tr> <td align=left>libnss3</td> <td align=center>CVE-2020-25648</td> <td align=center>LOW</td> <td align=center>2:3.49.1-1ubuntu1.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1887319">https://bugzilla.redhat.com/show_bug.cgi?id=1887319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648</a><br><a href=https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes>https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25648.html>https://linux.oracle.com/cve/CVE-2020-25648.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3572.html>https://linux.oracle.com/errata/ELSA-2021-3572.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libopenexr-dev</td> <td align=center>CVE-2021-20296</td> <td align=center>LOW</td> <td align=center>2.3.0-6ubuntu0.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939141">https://bugzilla.redhat.com/show_bug.cgi?id=1939141</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href=https://ubuntu.com/security/notices/USN-4996-1>https://ubuntu.com/security/notices/USN-4996-1</a><br><a href=https://ubuntu.com/security/notices/USN-4996-2>https://ubuntu.com/security/notices/USN-4996-2</a><br><a href=https://www.openexr.com/ >https://www.openexr.com/</a><br></details></td> </tr> <tr> <td align=left>libopenexr-dev</td> <td align=center>CVE-2021-3598</td> <td align=center>LOW</td> <td align=center>2.3.0-6ubuntu0.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970987">https://bugzilla.redhat.com/show_bug.cgi?id=1970987</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/pull/1037>https://github.com/AcademySoftwareFoundation/openexr/pull/1037</a><br><a href=https://ubuntu.com/security/notices/USN-4996-1>https://ubuntu.com/security/notices/USN-4996-1</a><br><a href=https://ubuntu.com/security/notices/USN-4996-2>https://ubuntu.com/security/notices/USN-4996-2</a><br></details></td> </tr> <tr> <td align=left>libopenexr-dev</td> <td align=center>CVE-2021-45942</td> <td align=center>LOW</td> <td align=center>2.3.0-6ubuntu0.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022>https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e>https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0>https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/pull/1209>https://github.com/AcademySoftwareFoundation/openexr/pull/1209</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4>https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml</a><br></details></td> </tr> <tr> <td align=left>libopenexr24</td> <td align=center>CVE-2021-20296</td> <td align=center>LOW</td> <td align=center>2.3.0-6ubuntu0.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939141">https://bugzilla.redhat.com/show_bug.cgi?id=1939141</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html</a><br><a href=https://ubuntu.com/security/notices/USN-4996-1>https://ubuntu.com/security/notices/USN-4996-1</a><br><a href=https://ubuntu.com/security/notices/USN-4996-2>https://ubuntu.com/security/notices/USN-4996-2</a><br><a href=https://www.openexr.com/ >https://www.openexr.com/</a><br></details></td> </tr> <tr> <td align=left>libopenexr24</td> <td align=center>CVE-2021-3598</td> <td align=center>LOW</td> <td align=center>2.3.0-6ubuntu0.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1970987">https://bugzilla.redhat.com/show_bug.cgi?id=1970987</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/pull/1037>https://github.com/AcademySoftwareFoundation/openexr/pull/1037</a><br><a href=https://ubuntu.com/security/notices/USN-4996-1>https://ubuntu.com/security/notices/USN-4996-1</a><br><a href=https://ubuntu.com/security/notices/USN-4996-2>https://ubuntu.com/security/notices/USN-4996-2</a><br></details></td> </tr> <tr> <td align=left>libopenexr24</td> <td align=center>CVE-2021-45942</td> <td align=center>LOW</td> <td align=center>2.3.0-6ubuntu0.5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022>https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e>https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0>https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/pull/1209>https://github.com/AcademySoftwareFoundation/openexr/pull/1209</a><br><a href=https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4>https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml</a><br></details></td> </tr> <tr> <td align=left>libopenjp2-7</td> <td align=center>CVE-2019-6988</td> <td align=center>LOW</td> <td align=center>2.3.1-1ubuntu4.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106785>http://www.securityfocus.com/bid/106785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988</a><br><a href=https://github.com/uclouvain/openjpeg/issues/1178>https://github.com/uclouvain/openjpeg/issues/1178</a><br></details></td> </tr> <tr> <td align=left>libopenjp2-7</td> <td align=center>CVE-2021-29338</td> <td align=center>LOW</td> <td align=center>2.3.1-1ubuntu4.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338</a><br><a href=https://github.com/uclouvain/openjpeg/issues/1338>https://github.com/uclouvain/openjpeg/issues/1338</a><br><a href=https://github.com/uclouvain/openjpeg/pull/1346>https://github.com/uclouvain/openjpeg/pull/1346</a><br><a href=https://github.com/uclouvain/openjpeg/pull/1395>https://github.com/uclouvain/openjpeg/pull/1395</a><br><a href=https://github.com/uclouvain/openjpeg/pull/1396>https://github.com/uclouvain/openjpeg/pull/1396</a><br><a href=https://github.com/uclouvain/openjpeg/pull/1397>https://github.com/uclouvain/openjpeg/pull/1397</a><br><a href=https://github.com/uclouvain/openjpeg/pull/1398>https://github.com/uclouvain/openjpeg/pull/1398</a><br><a href=https://linux.oracle.com/cve/CVE-2021-29338.html>https://linux.oracle.com/cve/CVE-2021-29338.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4251.html>https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/</a><br></details></td> </tr> <tr> <td align=left>libopenjp2-7</td> <td align=center>CVE-2021-3575</td> <td align=center>LOW</td> <td align=center>2.3.1-1ubuntu4.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1957616">https://bugzilla.redhat.com/show_bug.cgi?id=1957616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575</a><br><a href=https://github.com/uclouvain/openjpeg/issues/1347>https://github.com/uclouvain/openjpeg/issues/1347</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3575.html>https://linux.oracle.com/cve/CVE-2021-3575.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4251.html>https://linux.oracle.com/errata/ELSA-2021-4251.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3575>https://ubuntu.com/security/CVE-2021-3575</a><br></details></td> </tr> <tr> <td align=left>libpam-systemd</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>libpam-systemd</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>libpam-systemd</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>libpcre16-3</td> <td align=center>CVE-2017-11164</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/07/11/3>http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href=http://www.securityfocus.com/bid/99575>http://www.securityfocus.com/bid/99575</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libpcre16-3</td> <td align=center>CVE-2019-20838</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href=https://linux.oracle.com/cve/CVE-2019-20838.html>https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre16-3</td> <td align=center>CVE-2020-14155</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ >https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14155.html>https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre3</td> <td align=center>CVE-2017-11164</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/07/11/3>http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href=http://www.securityfocus.com/bid/99575>http://www.securityfocus.com/bid/99575</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libpcre3</td> <td align=center>CVE-2019-20838</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href=https://linux.oracle.com/cve/CVE-2019-20838.html>https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre3</td> <td align=center>CVE-2020-14155</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ >https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14155.html>https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre3-dev</td> <td align=center>CVE-2017-11164</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/07/11/3>http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href=http://www.securityfocus.com/bid/99575>http://www.securityfocus.com/bid/99575</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libpcre3-dev</td> <td align=center>CVE-2019-20838</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href=https://linux.oracle.com/cve/CVE-2019-20838.html>https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre3-dev</td> <td align=center>CVE-2020-14155</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ >https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14155.html>https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre32-3</td> <td align=center>CVE-2017-11164</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/07/11/3>http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href=http://www.securityfocus.com/bid/99575>http://www.securityfocus.com/bid/99575</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libpcre32-3</td> <td align=center>CVE-2019-20838</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href=https://linux.oracle.com/cve/CVE-2019-20838.html>https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcre32-3</td> <td align=center>CVE-2020-14155</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ >https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14155.html>https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcrecpp0v5</td> <td align=center>CVE-2017-11164</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/07/11/3>http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href=http://www.securityfocus.com/bid/99575>http://www.securityfocus.com/bid/99575</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libpcrecpp0v5</td> <td align=center>CVE-2019-20838</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href=https://linux.oracle.com/cve/CVE-2019-20838.html>https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libpcrecpp0v5</td> <td align=center>CVE-2020-14155</td> <td align=center>LOW</td> <td align=center>2:8.39-12build1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2021/Feb/14>http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href=https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ >https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href=https://bugs.gentoo.org/717920>https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14155.html>https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4373.html>https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://support.apple.com/kb/HT212147>https://support.apple.com/kb/HT212147</a><br><a href=https://www.pcre.org/original/changelog.txt>https://www.pcre.org/original/changelog.txt</a><br></details></td> </tr> <tr> <td align=left>libperl5.30</td> <td align=center>CVE-2020-16156</td> <td align=center>MEDIUM</td> <td align=center>5.30.0-9ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html>http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href=https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ >https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href=https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c>https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href=https://metacpan.org/pod/distribution/CPAN/scripts/cpan>https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details></td> </tr> <tr> <td align=left>libpolkit-agent-1-0</td> <td align=center>CVE-2021-4034</td> <td align=center>HIGH</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center>0.105-26ubuntu1.2</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html>http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html</a><br><a href=http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html>http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html</a><br><a href=https://access.redhat.com/security/vulnerabilities/RHSB-2022-001>https://access.redhat.com/security/vulnerabilities/RHSB-2022-001</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869">https://bugzilla.redhat.com/show_bug.cgi?id=2025869</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034</a><br><a href=https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683>https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4034.html>https://linux.oracle.com/cve/CVE-2021-4034.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9073.html>https://linux.oracle.com/errata/ELSA-2022-9073.html</a><br><a href=https://ubuntu.com/security/notices/USN-5252-1>https://ubuntu.com/security/notices/USN-5252-1</a><br><a href=https://ubuntu.com/security/notices/USN-5252-2>https://ubuntu.com/security/notices/USN-5252-2</a><br><a href=https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt>https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</a><br></details></td> </tr> <tr> <td align=left>libpolkit-agent-1-0</td> <td align=center>CVE-2021-4115</td> <td align=center>MEDIUM</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center>0.105-26ubuntu1.3</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/cve-2021-4115>https://access.redhat.com/security/cve/cve-2021-4115</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115</a><br><a href="https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e">https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e</a><br><a href=https://gitlab.freedesktop.org/polkit/polkit/-/issues/141>https://gitlab.freedesktop.org/polkit/polkit/-/issues/141</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/</a><br><a href=https://securitylab.github.com/advisories/GHSL-2021-077-polkit/ >https://securitylab.github.com/advisories/GHSL-2021-077-polkit/</a><br><a href=https://ubuntu.com/security/notices/USN-5304-1>https://ubuntu.com/security/notices/USN-5304-1</a><br></details></td> </tr> <tr> <td align=left>libpolkit-agent-1-0</td> <td align=center>CVE-2016-2568</td> <td align=center>LOW</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2016/q1/443>http://seclists.org/oss-sec/2016/q1/443</a><br><a href=http://www.openwall.com/lists/oss-security/2016/02/26/3>http://www.openwall.com/lists/oss-security/2016/02/26/3</a><br><a href=https://access.redhat.com/security/cve/cve-2016-2568>https://access.redhat.com/security/cve/cve-2016-2568</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1300746">https://bugzilla.redhat.com/show_bug.cgi?id=1300746</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568</a><br><a href=https://lore.kernel.org/patchwork/patch/793178/ >https://lore.kernel.org/patchwork/patch/793178/</a><br><a href=https://ubuntu.com/security/CVE-2016-2568>https://ubuntu.com/security/CVE-2016-2568</a><br></details></td> </tr> <tr> <td align=left>libpolkit-gobject-1-0</td> <td align=center>CVE-2021-4034</td> <td align=center>HIGH</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center>0.105-26ubuntu1.2</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html>http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html</a><br><a href=http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html>http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html</a><br><a href=https://access.redhat.com/security/vulnerabilities/RHSB-2022-001>https://access.redhat.com/security/vulnerabilities/RHSB-2022-001</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869">https://bugzilla.redhat.com/show_bug.cgi?id=2025869</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034</a><br><a href=https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683>https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4034.html>https://linux.oracle.com/cve/CVE-2021-4034.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9073.html>https://linux.oracle.com/errata/ELSA-2022-9073.html</a><br><a href=https://ubuntu.com/security/notices/USN-5252-1>https://ubuntu.com/security/notices/USN-5252-1</a><br><a href=https://ubuntu.com/security/notices/USN-5252-2>https://ubuntu.com/security/notices/USN-5252-2</a><br><a href=https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt>https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</a><br></details></td> </tr> <tr> <td align=left>libpolkit-gobject-1-0</td> <td align=center>CVE-2021-4115</td> <td align=center>MEDIUM</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center>0.105-26ubuntu1.3</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/cve-2021-4115>https://access.redhat.com/security/cve/cve-2021-4115</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115</a><br><a href="https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e">https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e</a><br><a href=https://gitlab.freedesktop.org/polkit/polkit/-/issues/141>https://gitlab.freedesktop.org/polkit/polkit/-/issues/141</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/</a><br><a href=https://securitylab.github.com/advisories/GHSL-2021-077-polkit/ >https://securitylab.github.com/advisories/GHSL-2021-077-polkit/</a><br><a href=https://ubuntu.com/security/notices/USN-5304-1>https://ubuntu.com/security/notices/USN-5304-1</a><br></details></td> </tr> <tr> <td align=left>libpolkit-gobject-1-0</td> <td align=center>CVE-2016-2568</td> <td align=center>LOW</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2016/q1/443>http://seclists.org/oss-sec/2016/q1/443</a><br><a href=http://www.openwall.com/lists/oss-security/2016/02/26/3>http://www.openwall.com/lists/oss-security/2016/02/26/3</a><br><a href=https://access.redhat.com/security/cve/cve-2016-2568>https://access.redhat.com/security/cve/cve-2016-2568</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1300746">https://bugzilla.redhat.com/show_bug.cgi?id=1300746</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568</a><br><a href=https://lore.kernel.org/patchwork/patch/793178/ >https://lore.kernel.org/patchwork/patch/793178/</a><br><a href=https://ubuntu.com/security/CVE-2016-2568>https://ubuntu.com/security/CVE-2016-2568</a><br></details></td> </tr> <tr> <td align=left>libpoppler-glib8</td> <td align=center>CVE-2019-9543</td> <td align=center>LOW</td> <td align=center>0.86.1-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/107238>http://www.securityfocus.com/bid/107238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543</a><br><a href=https://gitlab.freedesktop.org/poppler/poppler/issues/730>https://gitlab.freedesktop.org/poppler/poppler/issues/730</a><br><a href=https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/ >https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/</a><br></details></td> </tr> <tr> <td align=left>libpoppler-glib8</td> <td align=center>CVE-2019-9545</td> <td align=center>LOW</td> <td align=center>0.86.1-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545</a><br><a href=https://gitlab.freedesktop.org/poppler/poppler/issues/731>https://gitlab.freedesktop.org/poppler/poppler/issues/731</a><br><a href=https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/ >https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/</a><br></details></td> </tr> <tr> <td align=left>libpoppler97</td> <td align=center>CVE-2019-9543</td> <td align=center>LOW</td> <td align=center>0.86.1-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/107238>http://www.securityfocus.com/bid/107238</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543</a><br><a href=https://gitlab.freedesktop.org/poppler/poppler/issues/730>https://gitlab.freedesktop.org/poppler/poppler/issues/730</a><br><a href=https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/ >https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/</a><br></details></td> </tr> <tr> <td align=left>libpoppler97</td> <td align=center>CVE-2019-9545</td> <td align=center>LOW</td> <td align=center>0.86.1-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545</a><br><a href=https://gitlab.freedesktop.org/poppler/poppler/issues/731>https://gitlab.freedesktop.org/poppler/poppler/issues/731</a><br><a href=https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/ >https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/</a><br></details></td> </tr> <tr> <td align=left>libpq-dev</td> <td align=center>CVE-2021-3449</td> <td align=center>HIGH</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.8-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/03/27/1>http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href=http://www.openwall.com/lists/oss-security/2021/03/27/2>http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/03/28/3>http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/03/28/4>http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148</a><br><a href=https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845>https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3449.html>https://linux.oracle.com/cve/CVE-2021-3449.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9151.html>https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href=https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013>https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href=https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc>https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href=https://security.gentoo.org/glsa/202103-03>https://security.gentoo.org/glsa/202103-03</a><br><a href=https://security.netapp.com/advisory/ntap-20210326-0006/ >https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href=https://security.netapp.com/advisory/ntap-20210513-0002/ >https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href=https://ubuntu.com/security/notices/USN-4891-1>https://ubuntu.com/security/notices/USN-4891-1</a><br><a href=https://ubuntu.com/security/notices/USN-5038-1>https://ubuntu.com/security/notices/USN-5038-1</a><br><a href=https://www.debian.org/security/2021/dsa-4875>https://www.debian.org/security/2021/dsa-4875</a><br><a href=https://www.openssl.org/news/secadv/20210325.txt>https://www.openssl.org/news/secadv/20210325.txt</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpuApr2021.html>https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-05>https://www.tenable.com/security/tns-2021-05</a><br><a href=https://www.tenable.com/security/tns-2021-06>https://www.tenable.com/security/tns-2021-06</a><br><a href=https://www.tenable.com/security/tns-2021-09>https://www.tenable.com/security/tns-2021-09</a><br><a href=https://www.tenable.com/security/tns-2021-10>https://www.tenable.com/security/tns-2021-10</a><br></details></td> </tr> <tr> <td align=left>libpq-dev</td> <td align=center>CVE-2021-23214</td> <td align=center>MEDIUM</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.9-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022666">https://bugzilla.redhat.com/show_bug.cgi?id=2022666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951</a><br><a href=https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951>https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23214.html>https://linux.oracle.com/cve/CVE-2021-23214.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5236.html>https://linux.oracle.com/errata/ELSA-2021-5236.html</a><br><a href=https://ubuntu.com/security/notices/USN-5145-1>https://ubuntu.com/security/notices/USN-5145-1</a><br><a href=https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ >https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href=https://www.postgresql.org/support/security/CVE-2021-23214/ >https://www.postgresql.org/support/security/CVE-2021-23214/</a><br></details></td> </tr> <tr> <td align=left>libpq-dev</td> <td align=center>CVE-2021-23222</td> <td align=center>MEDIUM</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.9-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022675">https://bugzilla.redhat.com/show_bug.cgi?id=2022675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228</a><br><a href=https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45>https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45</a><br><a href=https://ubuntu.com/security/notices/USN-5145-1>https://ubuntu.com/security/notices/USN-5145-1</a><br><a href=https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ >https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href=https://www.postgresql.org/support/security/CVE-2021-23222/ >https://www.postgresql.org/support/security/CVE-2021-23222/</a><br></details></td> </tr> <tr> <td align=left>libpq-dev</td> <td align=center>CVE-2021-3677</td> <td align=center>MEDIUM</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.8-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2001857">https://bugzilla.redhat.com/show_bug.cgi?id=2001857</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3677.html>https://linux.oracle.com/cve/CVE-2021-3677.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5236.html>https://linux.oracle.com/errata/ELSA-2021-5236.html</a><br><a href=https://ubuntu.com/security/notices/USN-5038-1>https://ubuntu.com/security/notices/USN-5038-1</a><br><a href=https://www.postgresql.org/support/security/CVE-2021-3677/ >https://www.postgresql.org/support/security/CVE-2021-3677/</a><br></details></td> </tr> <tr> <td align=left>libpq5</td> <td align=center>CVE-2021-3449</td> <td align=center>HIGH</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.8-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/03/27/1>http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href=http://www.openwall.com/lists/oss-security/2021/03/27/2>http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/03/28/3>http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/03/28/4>http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148</a><br><a href=https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845>https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3449.html>https://linux.oracle.com/cve/CVE-2021-3449.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9151.html>https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href=https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013>https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href=https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc>https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href=https://security.gentoo.org/glsa/202103-03>https://security.gentoo.org/glsa/202103-03</a><br><a href=https://security.netapp.com/advisory/ntap-20210326-0006/ >https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href=https://security.netapp.com/advisory/ntap-20210513-0002/ >https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href=https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href=https://ubuntu.com/security/notices/USN-4891-1>https://ubuntu.com/security/notices/USN-4891-1</a><br><a href=https://ubuntu.com/security/notices/USN-5038-1>https://ubuntu.com/security/notices/USN-5038-1</a><br><a href=https://www.debian.org/security/2021/dsa-4875>https://www.debian.org/security/2021/dsa-4875</a><br><a href=https://www.openssl.org/news/secadv/20210325.txt>https://www.openssl.org/news/secadv/20210325.txt</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpuApr2021.html>https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-05>https://www.tenable.com/security/tns-2021-05</a><br><a href=https://www.tenable.com/security/tns-2021-06>https://www.tenable.com/security/tns-2021-06</a><br><a href=https://www.tenable.com/security/tns-2021-09>https://www.tenable.com/security/tns-2021-09</a><br><a href=https://www.tenable.com/security/tns-2021-10>https://www.tenable.com/security/tns-2021-10</a><br></details></td> </tr> <tr> <td align=left>libpq5</td> <td align=center>CVE-2021-23214</td> <td align=center>MEDIUM</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.9-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022666">https://bugzilla.redhat.com/show_bug.cgi?id=2022666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951</a><br><a href=https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951>https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23214.html>https://linux.oracle.com/cve/CVE-2021-23214.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5236.html>https://linux.oracle.com/errata/ELSA-2021-5236.html</a><br><a href=https://ubuntu.com/security/notices/USN-5145-1>https://ubuntu.com/security/notices/USN-5145-1</a><br><a href=https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ >https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href=https://www.postgresql.org/support/security/CVE-2021-23214/ >https://www.postgresql.org/support/security/CVE-2021-23214/</a><br></details></td> </tr> <tr> <td align=left>libpq5</td> <td align=center>CVE-2021-23222</td> <td align=center>MEDIUM</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.9-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2022675">https://bugzilla.redhat.com/show_bug.cgi?id=2022675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222</a><br><a href="https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228">https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228</a><br><a href=https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45>https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45</a><br><a href=https://ubuntu.com/security/notices/USN-5145-1>https://ubuntu.com/security/notices/USN-5145-1</a><br><a href=https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ >https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/</a><br><a href=https://www.postgresql.org/support/security/CVE-2021-23222/ >https://www.postgresql.org/support/security/CVE-2021-23222/</a><br></details></td> </tr> <tr> <td align=left>libpq5</td> <td align=center>CVE-2021-3677</td> <td align=center>MEDIUM</td> <td align=center>12.7-0ubuntu0.20.04.1</td> <td align=center>12.8-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2001857">https://bugzilla.redhat.com/show_bug.cgi?id=2001857</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3677.html>https://linux.oracle.com/cve/CVE-2021-3677.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5236.html>https://linux.oracle.com/errata/ELSA-2021-5236.html</a><br><a href=https://ubuntu.com/security/notices/USN-5038-1>https://ubuntu.com/security/notices/USN-5038-1</a><br><a href=https://www.postgresql.org/support/security/CVE-2021-3677/ >https://www.postgresql.org/support/security/CVE-2021-3677/</a><br></details></td> </tr> <tr> <td align=left>libpython3.8</td> <td align=center>CVE-2021-29921</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.1</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue36384>https://bugs.python.org/issue36384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921</a><br><a href=https://docs.python.org/3/library/ipaddress.html>https://docs.python.org/3/library/ipaddress.html</a><br><a href=https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst>https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst</a><br><a href=https://github.com/python/cpython/pull/12577>https://github.com/python/cpython/pull/12577</a><br><a href=https://github.com/python/cpython/pull/25099>https://github.com/python/cpython/pull/25099</a><br><a href=https://github.com/sickcodes>https://github.com/sickcodes</a><br><a href=https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md>https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md</a><br><a href=https://linux.oracle.com/cve/CVE-2021-29921.html>https://linux.oracle.com/cve/CVE-2021-29921.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4162.html>https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href=https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html>https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210622-0003/ >https://security.netapp.com/advisory/ntap-20210622-0003/</a><br><a href=https://sick.codes/sick-2021-014>https://sick.codes/sick-2021-014</a><br><a href=https://ubuntu.com/security/notices/USN-4973-1>https://ubuntu.com/security/notices/USN-4973-1</a><br><a href=https://ubuntu.com/security/notices/USN-4973-2>https://ubuntu.com/security/notices/USN-4973-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libpython3.8</td> <td align=center>CVE-2021-3737</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.2</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue44022>https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href=https://github.com/python/cpython/pull/25916>https://github.com/python/cpython/pull/25916</a><br><a href=https://github.com/python/cpython/pull/26503>https://github.com/python/cpython/pull/26503</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3737.html>https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4160.html>https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href=https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html>https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3737>https://ubuntu.com/security/CVE-2021-3737</a><br><a href=https://ubuntu.com/security/notices/USN-5083-1>https://ubuntu.com/security/notices/USN-5083-1</a><br><a href=https://ubuntu.com/security/notices/USN-5199-1>https://ubuntu.com/security/notices/USN-5199-1</a><br><a href=https://ubuntu.com/security/notices/USN-5200-1>https://ubuntu.com/security/notices/USN-5200-1</a><br><a href=https://ubuntu.com/security/notices/USN-5201-1>https://ubuntu.com/security/notices/USN-5201-1</a><br></details></td> </tr> <tr> <td align=left>libpython3.8</td> <td align=center>CVE-2022-0391</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue43882>https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0009/ >https://security.netapp.com/advisory/ntap-20220225-0009/</a><br></details></td> </tr> <tr> <td align=left>libpython3.8-minimal</td> <td align=center>CVE-2021-29921</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.1</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue36384>https://bugs.python.org/issue36384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921</a><br><a href=https://docs.python.org/3/library/ipaddress.html>https://docs.python.org/3/library/ipaddress.html</a><br><a href=https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst>https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst</a><br><a href=https://github.com/python/cpython/pull/12577>https://github.com/python/cpython/pull/12577</a><br><a href=https://github.com/python/cpython/pull/25099>https://github.com/python/cpython/pull/25099</a><br><a href=https://github.com/sickcodes>https://github.com/sickcodes</a><br><a href=https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md>https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md</a><br><a href=https://linux.oracle.com/cve/CVE-2021-29921.html>https://linux.oracle.com/cve/CVE-2021-29921.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4162.html>https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href=https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html>https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210622-0003/ >https://security.netapp.com/advisory/ntap-20210622-0003/</a><br><a href=https://sick.codes/sick-2021-014>https://sick.codes/sick-2021-014</a><br><a href=https://ubuntu.com/security/notices/USN-4973-1>https://ubuntu.com/security/notices/USN-4973-1</a><br><a href=https://ubuntu.com/security/notices/USN-4973-2>https://ubuntu.com/security/notices/USN-4973-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libpython3.8-minimal</td> <td align=center>CVE-2021-3737</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.2</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue44022>https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href=https://github.com/python/cpython/pull/25916>https://github.com/python/cpython/pull/25916</a><br><a href=https://github.com/python/cpython/pull/26503>https://github.com/python/cpython/pull/26503</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3737.html>https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4160.html>https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href=https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html>https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3737>https://ubuntu.com/security/CVE-2021-3737</a><br><a href=https://ubuntu.com/security/notices/USN-5083-1>https://ubuntu.com/security/notices/USN-5083-1</a><br><a href=https://ubuntu.com/security/notices/USN-5199-1>https://ubuntu.com/security/notices/USN-5199-1</a><br><a href=https://ubuntu.com/security/notices/USN-5200-1>https://ubuntu.com/security/notices/USN-5200-1</a><br><a href=https://ubuntu.com/security/notices/USN-5201-1>https://ubuntu.com/security/notices/USN-5201-1</a><br></details></td> </tr> <tr> <td align=left>libpython3.8-minimal</td> <td align=center>CVE-2022-0391</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue43882>https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0009/ >https://security.netapp.com/advisory/ntap-20220225-0009/</a><br></details></td> </tr> <tr> <td align=left>libpython3.8-stdlib</td> <td align=center>CVE-2021-29921</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.1</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue36384>https://bugs.python.org/issue36384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921</a><br><a href=https://docs.python.org/3/library/ipaddress.html>https://docs.python.org/3/library/ipaddress.html</a><br><a href=https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst>https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst</a><br><a href=https://github.com/python/cpython/pull/12577>https://github.com/python/cpython/pull/12577</a><br><a href=https://github.com/python/cpython/pull/25099>https://github.com/python/cpython/pull/25099</a><br><a href=https://github.com/sickcodes>https://github.com/sickcodes</a><br><a href=https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md>https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md</a><br><a href=https://linux.oracle.com/cve/CVE-2021-29921.html>https://linux.oracle.com/cve/CVE-2021-29921.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4162.html>https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href=https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html>https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210622-0003/ >https://security.netapp.com/advisory/ntap-20210622-0003/</a><br><a href=https://sick.codes/sick-2021-014>https://sick.codes/sick-2021-014</a><br><a href=https://ubuntu.com/security/notices/USN-4973-1>https://ubuntu.com/security/notices/USN-4973-1</a><br><a href=https://ubuntu.com/security/notices/USN-4973-2>https://ubuntu.com/security/notices/USN-4973-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>libpython3.8-stdlib</td> <td align=center>CVE-2021-3737</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.2</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue44022>https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href=https://github.com/python/cpython/pull/25916>https://github.com/python/cpython/pull/25916</a><br><a href=https://github.com/python/cpython/pull/26503>https://github.com/python/cpython/pull/26503</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3737.html>https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4160.html>https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href=https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html>https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3737>https://ubuntu.com/security/CVE-2021-3737</a><br><a href=https://ubuntu.com/security/notices/USN-5083-1>https://ubuntu.com/security/notices/USN-5083-1</a><br><a href=https://ubuntu.com/security/notices/USN-5199-1>https://ubuntu.com/security/notices/USN-5199-1</a><br><a href=https://ubuntu.com/security/notices/USN-5200-1>https://ubuntu.com/security/notices/USN-5200-1</a><br><a href=https://ubuntu.com/security/notices/USN-5201-1>https://ubuntu.com/security/notices/USN-5201-1</a><br></details></td> </tr> <tr> <td align=left>libpython3.8-stdlib</td> <td align=center>CVE-2022-0391</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue43882>https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0009/ >https://security.netapp.com/advisory/ntap-20220225-0009/</a><br></details></td> </tr> <tr> <td align=left>libqt5concurrent5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5concurrent5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5concurrent5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5core5a</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5core5a</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5core5a</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5dbus5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5dbus5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5dbus5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5gui5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5gui5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5gui5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5network5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5network5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5network5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5printsupport5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5printsupport5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5printsupport5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5widgets5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5widgets5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5widgets5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libqt5xml5</td> <td align=center>CVE-2020-13962</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html</a><br><a href=https://bugreports.qt.io/browse/QTBUG-83450>https://bugreports.qt.io/browse/QTBUG-83450</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962</a><br><a href=https://github.com/mumble-voip/mumble/issues/3679>https://github.com/mumble-voip/mumble/issues/3679</a><br><a href=https://github.com/mumble-voip/mumble/pull/4032>https://github.com/mumble-voip/mumble/pull/4032</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13962.html>https://linux.oracle.com/cve/CVE-2020-13962.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4690.html>https://linux.oracle.com/errata/ELSA-2020-4690.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/</a><br><a href=https://security.gentoo.org/glsa/202007-18>https://security.gentoo.org/glsa/202007-18</a><br></details></td> </tr> <tr> <td align=left>libqt5xml5</td> <td align=center>CVE-2022-25255</td> <td align=center>MEDIUM</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://codereview.qt-project.org/c/qt/qtbase/+/393113>https://codereview.qt-project.org/c/qt/qtbase/+/393113</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/394914>https://codereview.qt-project.org/c/qt/qtbase/+/394914</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/396020>https://codereview.qt-project.org/c/qt/qtbase/+/396020</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</a><br><a href=https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff>https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff</a><br><a href=https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff>https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff</a><br></details></td> </tr> <tr> <td align=left>libqt5xml5</td> <td align=center>CVE-2020-17507</td> <td align=center>LOW</td> <td align=center>5.12.8+dfsg-0ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308436>https://codereview.qt-project.org/c/qt/qtbase/+/308436</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308495>https://codereview.qt-project.org/c/qt/qtbase/+/308495</a><br><a href=https://codereview.qt-project.org/c/qt/qtbase/+/308496>https://codereview.qt-project.org/c/qt/qtbase/+/308496</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17507.html>https://linux.oracle.com/cve/CVE-2020-17507.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1756.html>https://linux.oracle.com/errata/ELSA-2021-1756.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/</a><br><a href=https://security.gentoo.org/glsa/202009-04>https://security.gentoo.org/glsa/202009-04</a><br><a href=https://ubuntu.com/security/notices/USN-5081-1>https://ubuntu.com/security/notices/USN-5081-1</a><br></details></td> </tr> <tr> <td align=left>libroken18-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libsasl2-2</td> <td align=center>CVE-2022-24407</td> <td align=center>HIGH</td> <td align=center>2.1.27+dfsg-2</td> <td align=center>2.1.27+dfsg-2ubuntu0.1</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/23/4>http://www.openwall.com/lists/oss-security/2022/02/23/4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407</a><br><a href=https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst>https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst</a><br><a href=https://linux.oracle.com/cve/CVE-2022-24407.html>https://linux.oracle.com/cve/CVE-2022-24407.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9239.html>https://linux.oracle.com/errata/ELSA-2022-9239.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/</a><br><a href=https://ubuntu.com/security/notices/USN-5301-1>https://ubuntu.com/security/notices/USN-5301-1</a><br><a href=https://ubuntu.com/security/notices/USN-5301-2>https://ubuntu.com/security/notices/USN-5301-2</a><br><a href=https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28>https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28</a><br><a href=https://www.debian.org/security/2022/dsa-5087>https://www.debian.org/security/2022/dsa-5087</a><br></details></td> </tr> <tr> <td align=left>libsasl2-modules-db</td> <td align=center>CVE-2022-24407</td> <td align=center>HIGH</td> <td align=center>2.1.27+dfsg-2</td> <td align=center>2.1.27+dfsg-2ubuntu0.1</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/23/4>http://www.openwall.com/lists/oss-security/2022/02/23/4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407</a><br><a href=https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst>https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst</a><br><a href=https://linux.oracle.com/cve/CVE-2022-24407.html>https://linux.oracle.com/cve/CVE-2022-24407.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9239.html>https://linux.oracle.com/errata/ELSA-2022-9239.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/</a><br><a href=https://ubuntu.com/security/notices/USN-5301-1>https://ubuntu.com/security/notices/USN-5301-1</a><br><a href=https://ubuntu.com/security/notices/USN-5301-2>https://ubuntu.com/security/notices/USN-5301-2</a><br><a href=https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28>https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28</a><br><a href=https://www.debian.org/security/2022/dsa-5087>https://www.debian.org/security/2022/dsa-5087</a><br></details></td> </tr> <tr> <td align=left>libsepol1</td> <td align=center>CVE-2021-36084</td> <td align=center>LOW</td> <td align=center>3.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084</a><br><a href=https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3>https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36084.html>https://linux.oracle.com/cve/CVE-2021-36084.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4513.html>https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details></td> </tr> <tr> <td align=left>libsepol1</td> <td align=center>CVE-2021-36085</td> <td align=center>LOW</td> <td align=center>3.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085</a><br><a href=https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba>https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36085.html>https://linux.oracle.com/cve/CVE-2021-36085.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4513.html>https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details></td> </tr> <tr> <td align=left>libsepol1</td> <td align=center>CVE-2021-36086</td> <td align=center>LOW</td> <td align=center>3.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href=https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8>https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36086.html>https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4513.html>https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br></details></td> </tr> <tr> <td align=left>libsepol1</td> <td align=center>CVE-2021-36087</td> <td align=center>LOW</td> <td align=center>3.0-1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href=https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521>https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href=https://linux.oracle.com/cve/CVE-2021-36087.html>https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4513.html>https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br></details></td> </tr> <tr> <td align=left>libsmartcols1</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libsmartcols1</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2021-44142</td> <td align=center>HIGH</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.samba.org/show_bug.cgi?id=14914">https://bugzilla.samba.org/show_bug.cgi?id=14914</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142</a><br><a href=https://kb.cert.org/vuls/id/119678>https://kb.cert.org/vuls/id/119678</a><br><a href=https://linux.oracle.com/cve/CVE-2021-44142.html>https://linux.oracle.com/cve/CVE-2021-44142.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0332.html>https://linux.oracle.com/errata/ELSA-2022-0332.html</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://ubuntu.com/security/notices/USN-5260-2>https://ubuntu.com/security/notices/USN-5260-2</a><br><a href=https://ubuntu.com/security/notices/USN-5260-3>https://ubuntu.com/security/notices/USN-5260-3</a><br><a href=https://www.samba.org/samba/security/CVE-2021-44142.html>https://www.samba.org/samba/security/CVE-2021-44142.html</a><br><a href=https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin>https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2016-2124</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019660">https://bugzilla.redhat.com/show_bug.cgi?id=2019660</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124</a><br><a href=https://linux.oracle.com/cve/CVE-2016-2124.html>https://linux.oracle.com/cve/CVE-2016-2124.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5192.html>https://linux.oracle.com/errata/ELSA-2021-5192.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2016-2124.html>https://www.samba.org/samba/security/CVE-2016-2124.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2020-25717</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019672">https://bugzilla.redhat.com/show_bug.cgi?id=2019672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25717.html>https://linux.oracle.com/cve/CVE-2020-25717.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5192.html>https://linux.oracle.com/errata/ELSA-2021-5192.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25717.html>https://www.samba.org/samba/security/CVE-2020-25717.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2020-25718</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019726">https://bugzilla.redhat.com/show_bug.cgi?id=2019726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25718.html>https://www.samba.org/samba/security/CVE-2020-25718.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2020-25719</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019732">https://bugzilla.redhat.com/show_bug.cgi?id=2019732</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25719.html>https://linux.oracle.com/cve/CVE-2020-25719.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5195.html>https://linux.oracle.com/errata/ELSA-2021-5195.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25719.html>https://www.samba.org/samba/security/CVE-2020-25719.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2020-25721</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2021728">https://bugzilla.redhat.com/show_bug.cgi?id=2021728</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14725">https://bugzilla.samba.org/show_bug.cgi?id=14725</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25721.html>https://www.samba.org/samba/security/CVE-2020-25721.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2020-25722</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019764">https://bugzilla.redhat.com/show_bug.cgi?id=2019764</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25722.html>https://www.samba.org/samba/security/CVE-2020-25722.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2021-23192</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019666">https://bugzilla.redhat.com/show_bug.cgi?id=2019666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23192.html>https://linux.oracle.com/cve/CVE-2021-23192.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5082.html>https://linux.oracle.com/errata/ELSA-2021-5082.html</a><br><a href=https://ubuntu.com/security/CVE-2021-23192>https://ubuntu.com/security/CVE-2021-23192</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2021-23192.html>https://www.samba.org/samba/security/CVE-2021-23192.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2021-3738</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2021726">https://bugzilla.redhat.com/show_bug.cgi?id=2021726</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14468">https://bugzilla.samba.org/show_bug.cgi?id=14468</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2021-3738.html>https://www.samba.org/samba/security/CVE-2021-3738.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2022-0336</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://www.samba.org/samba/security/CVE-2022-0336.html>https://www.samba.org/samba/security/CVE-2022-0336.html</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libsmbclient</td> <td align=center>CVE-2021-43566</td> <td align=center>LOW</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.samba.org/show_bug.cgi?id=13979">https://bugzilla.samba.org/show_bug.cgi?id=13979</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://www.samba.org/samba/history/ >https://www.samba.org/samba/history/</a><br><a href=https://www.samba.org/samba/security/CVE-2021-43566.html>https://www.samba.org/samba/security/CVE-2021-43566.html</a><br></details></td> </tr> <tr> <td align=left>libsndfile1</td> <td align=center>CVE-2021-3246</td> <td align=center>MEDIUM</td> <td align=center>1.0.28-7</td> <td align=center>1.0.28-7ubuntu0.1</td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26803">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26803</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246</a><br><a href=https://github.com/libsndfile/libsndfile/issues/687>https://github.com/libsndfile/libsndfile/issues/687</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3246.html>https://linux.oracle.com/cve/CVE-2021-3246.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3295.html>https://linux.oracle.com/errata/ELSA-2021-3295.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/</a><br><a href=https://ubuntu.com/security/notices/USN-5025-1>https://ubuntu.com/security/notices/USN-5025-1</a><br><a href=https://ubuntu.com/security/notices/USN-5025-2>https://ubuntu.com/security/notices/USN-5025-2</a><br><a href=https://www.debian.org/security/2021/dsa-4947>https://www.debian.org/security/2021/dsa-4947</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-0</td> <td align=center>CVE-2020-9794</td> <td align=center>MEDIUM</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/HT211168>https://support.apple.com/HT211168</a><br><a href=https://support.apple.com/HT211170>https://support.apple.com/HT211170</a><br><a href=https://support.apple.com/HT211171>https://support.apple.com/HT211171</a><br><a href=https://support.apple.com/HT211175>https://support.apple.com/HT211175</a><br><a href=https://support.apple.com/HT211178>https://support.apple.com/HT211178</a><br><a href=https://support.apple.com/HT211179>https://support.apple.com/HT211179</a><br><a href=https://support.apple.com/HT211181>https://support.apple.com/HT211181</a><br><a href=https://vuldb.com/?id.155768>https://vuldb.com/?id.155768</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-0</td> <td align=center>CVE-2020-9849</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT211843>https://support.apple.com/en-us/HT211843</a><br><a href=https://support.apple.com/en-us/HT211844>https://support.apple.com/en-us/HT211844</a><br><a href=https://support.apple.com/en-us/HT211850>https://support.apple.com/en-us/HT211850</a><br><a href=https://support.apple.com/en-us/HT211931>https://support.apple.com/en-us/HT211931</a><br><a href=https://support.apple.com/en-us/HT211935>https://support.apple.com/en-us/HT211935</a><br><a href=https://support.apple.com/en-us/HT211952>https://support.apple.com/en-us/HT211952</a><br><a href=https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/ >https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-0</td> <td align=center>CVE-2020-9991</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT211843>https://support.apple.com/en-us/HT211843</a><br><a href=https://support.apple.com/en-us/HT211844>https://support.apple.com/en-us/HT211844</a><br><a href=https://support.apple.com/en-us/HT211847>https://support.apple.com/en-us/HT211847</a><br><a href=https://support.apple.com/en-us/HT211850>https://support.apple.com/en-us/HT211850</a><br><a href=https://support.apple.com/en-us/HT211931>https://support.apple.com/en-us/HT211931</a><br><a href=https://support.apple.com/kb/HT211846>https://support.apple.com/kb/HT211846</a><br><a href=https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/ >https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-0</td> <td align=center>CVE-2021-36690</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.sqlite.org/forum/forumpost/718c0a8d17>https://www.sqlite.org/forum/forumpost/718c0a8d17</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-dev</td> <td align=center>CVE-2020-9794</td> <td align=center>MEDIUM</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/HT211168>https://support.apple.com/HT211168</a><br><a href=https://support.apple.com/HT211170>https://support.apple.com/HT211170</a><br><a href=https://support.apple.com/HT211171>https://support.apple.com/HT211171</a><br><a href=https://support.apple.com/HT211175>https://support.apple.com/HT211175</a><br><a href=https://support.apple.com/HT211178>https://support.apple.com/HT211178</a><br><a href=https://support.apple.com/HT211179>https://support.apple.com/HT211179</a><br><a href=https://support.apple.com/HT211181>https://support.apple.com/HT211181</a><br><a href=https://vuldb.com/?id.155768>https://vuldb.com/?id.155768</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-dev</td> <td align=center>CVE-2020-9849</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT211843>https://support.apple.com/en-us/HT211843</a><br><a href=https://support.apple.com/en-us/HT211844>https://support.apple.com/en-us/HT211844</a><br><a href=https://support.apple.com/en-us/HT211850>https://support.apple.com/en-us/HT211850</a><br><a href=https://support.apple.com/en-us/HT211931>https://support.apple.com/en-us/HT211931</a><br><a href=https://support.apple.com/en-us/HT211935>https://support.apple.com/en-us/HT211935</a><br><a href=https://support.apple.com/en-us/HT211952>https://support.apple.com/en-us/HT211952</a><br><a href=https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/ >https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-dev</td> <td align=center>CVE-2020-9991</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT211843>https://support.apple.com/en-us/HT211843</a><br><a href=https://support.apple.com/en-us/HT211844>https://support.apple.com/en-us/HT211844</a><br><a href=https://support.apple.com/en-us/HT211847>https://support.apple.com/en-us/HT211847</a><br><a href=https://support.apple.com/en-us/HT211850>https://support.apple.com/en-us/HT211850</a><br><a href=https://support.apple.com/en-us/HT211931>https://support.apple.com/en-us/HT211931</a><br><a href=https://support.apple.com/kb/HT211846>https://support.apple.com/kb/HT211846</a><br><a href=https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/ >https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details></td> </tr> <tr> <td align=left>libsqlite3-dev</td> <td align=center>CVE-2021-36690</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.sqlite.org/forum/forumpost/718c0a8d17>https://www.sqlite.org/forum/forumpost/718c0a8d17</a><br></details></td> </tr> <tr> <td align=left>libssh-4</td> <td align=center>CVE-2021-3634</td> <td align=center>MEDIUM</td> <td align=center>0.9.3-2ubuntu2.1</td> <td align=center>0.9.3-2ubuntu2.2</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1978810">https://bugzilla.redhat.com/show_bug.cgi?id=1978810</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/</a><br><a href=https://security.netapp.com/advisory/ntap-20211004-0003/ >https://security.netapp.com/advisory/ntap-20211004-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5053-1>https://ubuntu.com/security/notices/USN-5053-1</a><br><a href=https://www.debian.org/security/2021/dsa-4965>https://www.debian.org/security/2021/dsa-4965</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>libssl-dev</td> <td align=center>CVE-2021-3711</td> <td align=center>HIGH</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.8</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/26/2>http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46</a><br><a href=https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0010/ >https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5051-1>https://ubuntu.com/security/notices/USN-5051-1</a><br><a href=https://www.debian.org/security/2021/dsa-4963>https://www.debian.org/security/2021/dsa-4963</a><br><a href=https://www.openssl.org/news/secadv/20210824.txt>https://www.openssl.org/news/secadv/20210824.txt</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-16>https://www.tenable.com/security/tns-2021-16</a><br><a href=https://www.tenable.com/security/tns-2022-02>https://www.tenable.com/security/tns-2022-02</a><br></details></td> </tr> <tr> <td align=left>libssl-dev</td> <td align=center>CVE-2022-0778</td> <td align=center>HIGH</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.12</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0778.html>https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9246.html>https://linux.oracle.com/errata/ELSA-2022-9246.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href=https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002>https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0002/ >https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5328-1>https://ubuntu.com/security/notices/USN-5328-1</a><br><a href=https://ubuntu.com/security/notices/USN-5328-2>https://ubuntu.com/security/notices/USN-5328-2</a><br><a href=https://www.debian.org/security/2022/dsa-5103>https://www.debian.org/security/2022/dsa-5103</a><br><a href=https://www.openssl.org/news/secadv/20220315.txt>https://www.openssl.org/news/secadv/20220315.txt</a><br></details></td> </tr> <tr> <td align=left>libssl-dev</td> <td align=center>CVE-2021-3712</td> <td align=center>MEDIUM</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.8</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/26/2>http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3712.html>https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9023.html>https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href=https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0010/ >https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href=https://ubuntu.com/security/notices/USN-5051-1>https://ubuntu.com/security/notices/USN-5051-1</a><br><a href=https://ubuntu.com/security/notices/USN-5051-2>https://ubuntu.com/security/notices/USN-5051-2</a><br><a href=https://ubuntu.com/security/notices/USN-5051-3>https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href=https://ubuntu.com/security/notices/USN-5088-1>https://ubuntu.com/security/notices/USN-5088-1</a><br><a href=https://www.debian.org/security/2021/dsa-4963>https://www.debian.org/security/2021/dsa-4963</a><br><a href=https://www.openssl.org/news/secadv/20210824.txt>https://www.openssl.org/news/secadv/20210824.txt</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-16>https://www.tenable.com/security/tns-2021-16</a><br><a href=https://www.tenable.com/security/tns-2022-02>https://www.tenable.com/security/tns-2022-02</a><br></details></td> </tr> <tr> <td align=left>libssl1.1</td> <td align=center>CVE-2021-3711</td> <td align=center>HIGH</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.8</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/26/2>http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46</a><br><a href=https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0010/ >https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5051-1>https://ubuntu.com/security/notices/USN-5051-1</a><br><a href=https://www.debian.org/security/2021/dsa-4963>https://www.debian.org/security/2021/dsa-4963</a><br><a href=https://www.openssl.org/news/secadv/20210824.txt>https://www.openssl.org/news/secadv/20210824.txt</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-16>https://www.tenable.com/security/tns-2021-16</a><br><a href=https://www.tenable.com/security/tns-2022-02>https://www.tenable.com/security/tns-2022-02</a><br></details></td> </tr> <tr> <td align=left>libssl1.1</td> <td align=center>CVE-2022-0778</td> <td align=center>HIGH</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.12</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0778.html>https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9246.html>https://linux.oracle.com/errata/ELSA-2022-9246.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href=https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002>https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0002/ >https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5328-1>https://ubuntu.com/security/notices/USN-5328-1</a><br><a href=https://ubuntu.com/security/notices/USN-5328-2>https://ubuntu.com/security/notices/USN-5328-2</a><br><a href=https://www.debian.org/security/2022/dsa-5103>https://www.debian.org/security/2022/dsa-5103</a><br><a href=https://www.openssl.org/news/secadv/20220315.txt>https://www.openssl.org/news/secadv/20220315.txt</a><br></details></td> </tr> <tr> <td align=left>libssl1.1</td> <td align=center>CVE-2021-3712</td> <td align=center>MEDIUM</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.8</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/26/2>http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3712.html>https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9023.html>https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href=https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0010/ >https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href=https://ubuntu.com/security/notices/USN-5051-1>https://ubuntu.com/security/notices/USN-5051-1</a><br><a href=https://ubuntu.com/security/notices/USN-5051-2>https://ubuntu.com/security/notices/USN-5051-2</a><br><a href=https://ubuntu.com/security/notices/USN-5051-3>https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href=https://ubuntu.com/security/notices/USN-5088-1>https://ubuntu.com/security/notices/USN-5088-1</a><br><a href=https://www.debian.org/security/2021/dsa-4963>https://www.debian.org/security/2021/dsa-4963</a><br><a href=https://www.openssl.org/news/secadv/20210824.txt>https://www.openssl.org/news/secadv/20210824.txt</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-16>https://www.tenable.com/security/tns-2021-16</a><br><a href=https://www.tenable.com/security/tns-2022-02>https://www.tenable.com/security/tns-2022-02</a><br></details></td> </tr> <tr> <td align=left>libstdc++-9-dev</td> <td align=center>CVE-2020-13844</td> <td align=center>MEDIUM</td> <td align=center>9.3.0-17ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html>http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href=https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html>https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details></td> </tr> <tr> <td align=left>libsvn1</td> <td align=center>CVE-2018-11803</td> <td align=center>MEDIUM</td> <td align=center>1.13.0-3</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106770>http://www.securityfocus.com/bid/106770</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803</a><br><a href=https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E>https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/201904-08>https://security.gentoo.org/glsa/201904-08</a><br><a href=https://subversion.apache.org/security/CVE-2018-11803-advisory.txt>https://subversion.apache.org/security/CVE-2018-11803-advisory.txt</a><br><a href=https://ubuntu.com/security/notices/USN-3869-1>https://ubuntu.com/security/notices/USN-3869-1</a><br><a href=https://usn.ubuntu.com/3869-1/ >https://usn.ubuntu.com/3869-1/</a><br></details></td> </tr> <tr> <td align=left>libsvn1</td> <td align=center>CVE-2020-17525</td> <td align=center>MEDIUM</td> <td align=center>1.13.0-3</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17525.html>https://linux.oracle.com/cve/CVE-2020-17525.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-0507.html>https://linux.oracle.com/errata/ELSA-2021-0507.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html>https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html</a><br><a href=https://subversion.apache.org/security/CVE-2020-17525-advisory.txt>https://subversion.apache.org/security/CVE-2020-17525-advisory.txt</a><br><a href=https://ubuntu.com/security/notices/USN-5322-1>https://ubuntu.com/security/notices/USN-5322-1</a><br></details></td> </tr> <tr> <td align=left>libsystemd0</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>libsystemd0</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>libsystemd0</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>libtasn1-6</td> <td align=center>CVE-2018-1000654</td> <td align=center>LOW</td> <td align=center>4.16.0-2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href=http://www.securityfocus.com/bid/105151>http://www.securityfocus.com/bid/105151</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654</a><br><a href=https://gitlab.com/gnutls/libtasn1/issues/4>https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2020-19143</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2851">http://bugzilla.maptools.org/show_bug.cgi?id=2851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/158>https://gitlab.com/libtiff/libtiff/-/issues/158</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/119>https://gitlab.com/libtiff/libtiff/-/merge_requests/119</a><br><a href=https://security.netapp.com/advisory/ntap-20211004-0005/ >https://security.netapp.com/advisory/ntap-20211004-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5084-1>https://ubuntu.com/security/notices/USN-5084-1</a><br><a href=https://www.debian.org/security/2021/dsa-4997>https://www.debian.org/security/2021/dsa-4997</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2022-0865</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067>https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/385>https://gitlab.com/libtiff/libtiff/-/issues/385</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/306>https://gitlab.com/libtiff/libtiff/-/merge_requests/306</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2022-0891</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891</a><br><a href=https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c>https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c>https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/380>https://gitlab.com/libtiff/libtiff/-/issues/380</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/382>https://gitlab.com/libtiff/libtiff/-/issues/382</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2018-10126</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2020-35522</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932037">https://bugzilla.redhat.com/show_bug.cgi?id=1932037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/165>https://gitlab.com/libtiff/libtiff/-/merge_requests/165</a><br><a href=https://linux.oracle.com/cve/CVE-2020-35522.html>https://linux.oracle.com/cve/CVE-2020-35522.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4241.html>https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href=https://security.gentoo.org/glsa/202104-06>https://security.gentoo.org/glsa/202104-06</a><br><a href=https://security.netapp.com/advisory/ntap-20210521-0009/ >https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2022-0561</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561</a><br><a href=https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef>https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/362>https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0001/ >https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2022-0562</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562</a><br><a href=https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b>https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/362>https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0001/ >https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff-dev</td> <td align=center>CVE-2022-22844</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/355>https://gitlab.com/libtiff/libtiff/-/issues/355</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/287>https://gitlab.com/libtiff/libtiff/-/merge_requests/287</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220311-0002/ >https://security.netapp.com/advisory/ntap-20220311-0002/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2020-19143</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2851">http://bugzilla.maptools.org/show_bug.cgi?id=2851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/158>https://gitlab.com/libtiff/libtiff/-/issues/158</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/119>https://gitlab.com/libtiff/libtiff/-/merge_requests/119</a><br><a href=https://security.netapp.com/advisory/ntap-20211004-0005/ >https://security.netapp.com/advisory/ntap-20211004-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5084-1>https://ubuntu.com/security/notices/USN-5084-1</a><br><a href=https://www.debian.org/security/2021/dsa-4997>https://www.debian.org/security/2021/dsa-4997</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2022-0865</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067>https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/385>https://gitlab.com/libtiff/libtiff/-/issues/385</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/306>https://gitlab.com/libtiff/libtiff/-/merge_requests/306</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2022-0891</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891</a><br><a href=https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c>https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c>https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/380>https://gitlab.com/libtiff/libtiff/-/issues/380</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/382>https://gitlab.com/libtiff/libtiff/-/issues/382</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2018-10126</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2020-35522</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932037">https://bugzilla.redhat.com/show_bug.cgi?id=1932037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/165>https://gitlab.com/libtiff/libtiff/-/merge_requests/165</a><br><a href=https://linux.oracle.com/cve/CVE-2020-35522.html>https://linux.oracle.com/cve/CVE-2020-35522.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4241.html>https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href=https://security.gentoo.org/glsa/202104-06>https://security.gentoo.org/glsa/202104-06</a><br><a href=https://security.netapp.com/advisory/ntap-20210521-0009/ >https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2022-0561</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561</a><br><a href=https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef>https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/362>https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0001/ >https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2022-0562</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562</a><br><a href=https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b>https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/362>https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0001/ >https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiff5</td> <td align=center>CVE-2022-22844</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/355>https://gitlab.com/libtiff/libtiff/-/issues/355</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/287>https://gitlab.com/libtiff/libtiff/-/merge_requests/287</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220311-0002/ >https://security.netapp.com/advisory/ntap-20220311-0002/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2020-19143</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2851">http://bugzilla.maptools.org/show_bug.cgi?id=2851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/158>https://gitlab.com/libtiff/libtiff/-/issues/158</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/119>https://gitlab.com/libtiff/libtiff/-/merge_requests/119</a><br><a href=https://security.netapp.com/advisory/ntap-20211004-0005/ >https://security.netapp.com/advisory/ntap-20211004-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5084-1>https://ubuntu.com/security/notices/USN-5084-1</a><br><a href=https://www.debian.org/security/2021/dsa-4997>https://www.debian.org/security/2021/dsa-4997</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2022-0865</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067>https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/385>https://gitlab.com/libtiff/libtiff/-/issues/385</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/306>https://gitlab.com/libtiff/libtiff/-/merge_requests/306</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2022-0891</td> <td align=center>MEDIUM</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891</a><br><a href=https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c>https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c>https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/380>https://gitlab.com/libtiff/libtiff/-/issues/380</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/382>https://gitlab.com/libtiff/libtiff/-/issues/382</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2018-10126</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2020-35522</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1932037">https://bugzilla.redhat.com/show_bug.cgi?id=1932037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/165>https://gitlab.com/libtiff/libtiff/-/merge_requests/165</a><br><a href=https://linux.oracle.com/cve/CVE-2020-35522.html>https://linux.oracle.com/cve/CVE-2020-35522.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4241.html>https://linux.oracle.com/errata/ELSA-2021-4241.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/</a><br><a href=https://security.gentoo.org/glsa/202104-06>https://security.gentoo.org/glsa/202104-06</a><br><a href=https://security.netapp.com/advisory/ntap-20210521-0009/ >https://security.netapp.com/advisory/ntap-20210521-0009/</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2022-0561</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561</a><br><a href=https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef>https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/362>https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0001/ >https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2022-0562</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562</a><br><a href=https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b>https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b</a><br><a href=https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json>https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/362>https://gitlab.com/libtiff/libtiff/-/issues/362</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0001/ >https://security.netapp.com/advisory/ntap-20220318-0001/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libtiffxx5</td> <td align=center>CVE-2022-22844</td> <td align=center>LOW</td> <td align=center>4.1.0+git191117-2ubuntu0.20.04.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844</a><br><a href=https://gitlab.com/libtiff/libtiff/-/issues/355>https://gitlab.com/libtiff/libtiff/-/issues/355</a><br><a href=https://gitlab.com/libtiff/libtiff/-/merge_requests/287>https://gitlab.com/libtiff/libtiff/-/merge_requests/287</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220311-0002/ >https://security.netapp.com/advisory/ntap-20220311-0002/</a><br><a href=https://www.debian.org/security/2022/dsa-5108>https://www.debian.org/security/2022/dsa-5108</a><br></details></td> </tr> <tr> <td align=left>libudev1</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>libudev1</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>libudev1</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>libudisks2-0</td> <td align=center>CVE-2021-3802</td> <td align=center>LOW</td> <td align=center>2.8.4-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2021-3802>https://access.redhat.com/security/cve/CVE-2021-3802</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2003649">https://bugzilla.redhat.com/show_bug.cgi?id=2003649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802</a><br><a href=https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4>https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4</a><br><a href=https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt>https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt</a><br></details></td> </tr> <tr> <td align=left>libuuid1</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libuuid1</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2021-44142</td> <td align=center>HIGH</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.samba.org/show_bug.cgi?id=14914">https://bugzilla.samba.org/show_bug.cgi?id=14914</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142</a><br><a href=https://kb.cert.org/vuls/id/119678>https://kb.cert.org/vuls/id/119678</a><br><a href=https://linux.oracle.com/cve/CVE-2021-44142.html>https://linux.oracle.com/cve/CVE-2021-44142.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0332.html>https://linux.oracle.com/errata/ELSA-2022-0332.html</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://ubuntu.com/security/notices/USN-5260-2>https://ubuntu.com/security/notices/USN-5260-2</a><br><a href=https://ubuntu.com/security/notices/USN-5260-3>https://ubuntu.com/security/notices/USN-5260-3</a><br><a href=https://www.samba.org/samba/security/CVE-2021-44142.html>https://www.samba.org/samba/security/CVE-2021-44142.html</a><br><a href=https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin>https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2016-2124</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019660">https://bugzilla.redhat.com/show_bug.cgi?id=2019660</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124</a><br><a href=https://linux.oracle.com/cve/CVE-2016-2124.html>https://linux.oracle.com/cve/CVE-2016-2124.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5192.html>https://linux.oracle.com/errata/ELSA-2021-5192.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2016-2124.html>https://www.samba.org/samba/security/CVE-2016-2124.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2020-25717</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019672">https://bugzilla.redhat.com/show_bug.cgi?id=2019672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25717.html>https://linux.oracle.com/cve/CVE-2020-25717.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5192.html>https://linux.oracle.com/errata/ELSA-2021-5192.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25717.html>https://www.samba.org/samba/security/CVE-2020-25717.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2020-25718</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019726">https://bugzilla.redhat.com/show_bug.cgi?id=2019726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25718.html>https://www.samba.org/samba/security/CVE-2020-25718.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2020-25719</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019732">https://bugzilla.redhat.com/show_bug.cgi?id=2019732</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25719.html>https://linux.oracle.com/cve/CVE-2020-25719.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5195.html>https://linux.oracle.com/errata/ELSA-2021-5195.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25719.html>https://www.samba.org/samba/security/CVE-2020-25719.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2020-25721</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2021728">https://bugzilla.redhat.com/show_bug.cgi?id=2021728</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14725">https://bugzilla.samba.org/show_bug.cgi?id=14725</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25721.html>https://www.samba.org/samba/security/CVE-2020-25721.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2020-25722</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019764">https://bugzilla.redhat.com/show_bug.cgi?id=2019764</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25722.html>https://www.samba.org/samba/security/CVE-2020-25722.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2021-23192</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019666">https://bugzilla.redhat.com/show_bug.cgi?id=2019666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23192.html>https://linux.oracle.com/cve/CVE-2021-23192.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5082.html>https://linux.oracle.com/errata/ELSA-2021-5082.html</a><br><a href=https://ubuntu.com/security/CVE-2021-23192>https://ubuntu.com/security/CVE-2021-23192</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2021-23192.html>https://www.samba.org/samba/security/CVE-2021-23192.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2021-3738</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2021726">https://bugzilla.redhat.com/show_bug.cgi?id=2021726</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14468">https://bugzilla.samba.org/show_bug.cgi?id=14468</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2021-3738.html>https://www.samba.org/samba/security/CVE-2021-3738.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2022-0336</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://www.samba.org/samba/security/CVE-2022-0336.html>https://www.samba.org/samba/security/CVE-2022-0336.html</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libwbclient0</td> <td align=center>CVE-2021-43566</td> <td align=center>LOW</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.samba.org/show_bug.cgi?id=13979">https://bugzilla.samba.org/show_bug.cgi?id=13979</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://www.samba.org/samba/history/ >https://www.samba.org/samba/history/</a><br><a href=https://www.samba.org/samba/security/CVE-2021-43566.html>https://www.samba.org/samba/security/CVE-2021-43566.html</a><br></details></td> </tr> <tr> <td align=left>libwind0-heimdal</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>7.7.0+dfsg-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>libxml-twig-perl</td> <td align=center>CVE-2016-9180</td> <td align=center>LOW</td> <td align=center>1:3.50-2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html>http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html>http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html</a><br><a href=http://www.openwall.com/lists/oss-security/2016/11/02/1>http://www.openwall.com/lists/oss-security/2016/11/02/1</a><br><a href=http://www.openwall.com/lists/oss-security/2016/11/04/2>http://www.openwall.com/lists/oss-security/2016/11/04/2</a><br><a href=http://www.securityfocus.com/bid/94219>http://www.securityfocus.com/bid/94219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180</a><br></details></td> </tr> <tr> <td align=left>libxml2</td> <td align=center>CVE-2022-23308</td> <td align=center>MEDIUM</td> <td align=center>2.9.10+dfsg-5ubuntu0.20.04.1</td> <td align=center>2.9.10+dfsg-5ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2022-23308>https://access.redhat.com/security/cve/CVE-2022-23308</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308</a><br><a href=https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e>https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e</a><br><a href=https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS>https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23308.html>https://linux.oracle.com/cve/CVE-2022-23308.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0899.html>https://linux.oracle.com/errata/ELSA-2022-0899.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/</a><br><a href=https://ubuntu.com/security/notices/USN-5324-1>https://ubuntu.com/security/notices/USN-5324-1</a><br></details></td> </tr> <tr> <td align=left>libxslt1.1</td> <td align=center>CVE-2015-9019</td> <td align=center>LOW</td> <td align=center>1.1.34-4</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.gnome.org/show_bug.cgi?id=758400">https://bugzilla.gnome.org/show_bug.cgi?id=758400</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=934119">https://bugzilla.suse.com/show_bug.cgi?id=934119</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019</a><br></details></td> </tr> <tr> <td align=left>libzmq3-dev</td> <td align=center>CVE-2020-15166</td> <td align=center>MEDIUM</td> <td align=center>4.3.2-2ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166</a><br><a href=https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09>https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09</a><br><a href=https://github.com/zeromq/libzmq/pull/3913>https://github.com/zeromq/libzmq/pull/3913</a><br><a href=https://github.com/zeromq/libzmq/pull/3973>https://github.com/zeromq/libzmq/pull/3973</a><br><a href=https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m>https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html>https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/</a><br><a href=https://security.gentoo.org/glsa/202009-12>https://security.gentoo.org/glsa/202009-12</a><br><a href=https://www.openwall.com/lists/oss-security/2020/09/07/3>https://www.openwall.com/lists/oss-security/2020/09/07/3</a><br></details></td> </tr> <tr> <td align=left>libzmq3-dev</td> <td align=center>CVE-2021-20235</td> <td align=center>MEDIUM</td> <td align=center>4.3.2-2ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1921983">https://bugzilla.redhat.com/show_bug.cgi?id=1921983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235</a><br><a href=https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6>https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6</a><br></details></td> </tr> <tr> <td align=left>libzmq3-dev</td> <td align=center>CVE-2021-20236</td> <td align=center>MEDIUM</td> <td align=center>4.3.2-2ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1921976">https://bugzilla.redhat.com/show_bug.cgi?id=1921976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236</a><br><a href=https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8>https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8</a><br></details></td> </tr> <tr> <td align=left>libzmq5</td> <td align=center>CVE-2020-15166</td> <td align=center>MEDIUM</td> <td align=center>4.3.2-2ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166</a><br><a href=https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09>https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09</a><br><a href=https://github.com/zeromq/libzmq/pull/3913>https://github.com/zeromq/libzmq/pull/3913</a><br><a href=https://github.com/zeromq/libzmq/pull/3973>https://github.com/zeromq/libzmq/pull/3973</a><br><a href=https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m>https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html>https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/</a><br><a href=https://security.gentoo.org/glsa/202009-12>https://security.gentoo.org/glsa/202009-12</a><br><a href=https://www.openwall.com/lists/oss-security/2020/09/07/3>https://www.openwall.com/lists/oss-security/2020/09/07/3</a><br></details></td> </tr> <tr> <td align=left>libzmq5</td> <td align=center>CVE-2021-20235</td> <td align=center>MEDIUM</td> <td align=center>4.3.2-2ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1921983">https://bugzilla.redhat.com/show_bug.cgi?id=1921983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235</a><br><a href=https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6>https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6</a><br></details></td> </tr> <tr> <td align=left>libzmq5</td> <td align=center>CVE-2021-20236</td> <td align=center>MEDIUM</td> <td align=center>4.3.2-2ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1921976">https://bugzilla.redhat.com/show_bug.cgi?id=1921976</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236</a><br><a href=https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8>https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-33909</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-80.90</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html>http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html</a><br><a href=http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html>http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html</a><br><a href=http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html>http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/07/22/7>http://www.openwall.com/lists/oss-security/2021/07/22/7</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/25/10>http://www.openwall.com/lists/oss-security/2021/08/25/10</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/17/2>http://www.openwall.com/lists/oss-security/2021/09/17/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/17/4>http://www.openwall.com/lists/oss-security/2021/09/17/4</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/21/1>http://www.openwall.com/lists/oss-security/2021/09/21/1</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b</a><br><a href=https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b>https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33909.html>https://linux.oracle.com/cve/CVE-2021-33909.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9410.html>https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/</a><br><a href=https://security.netapp.com/advisory/ntap-20210819-0004/ >https://security.netapp.com/advisory/ntap-20210819-0004/</a><br><a href=https://ubuntu.com/security/notices/USN-5014-1>https://ubuntu.com/security/notices/USN-5014-1</a><br><a href=https://ubuntu.com/security/notices/USN-5015-1>https://ubuntu.com/security/notices/USN-5015-1</a><br><a href=https://ubuntu.com/security/notices/USN-5016-1>https://ubuntu.com/security/notices/USN-5016-1</a><br><a href=https://ubuntu.com/security/notices/USN-5017-1>https://ubuntu.com/security/notices/USN-5017-1</a><br><a href=https://ubuntu.com/security/notices/USN-5018-1>https://ubuntu.com/security/notices/USN-5018-1</a><br><a href=https://www.debian.org/security/2021/dsa-4941>https://www.debian.org/security/2021/dsa-4941</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/1>https://www.openwall.com/lists/oss-security/2021/07/20/1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt>https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3653</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html>http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1983686">https://bugzilla.redhat.com/show_bug.cgi?id=1983686</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653</a><br><a href=https://github.com/torvalds/linux/commit/3d6368ef580a>https://github.com/torvalds/linux/commit/3d6368ef580a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3653.html>https://linux.oracle.com/cve/CVE-2021-3653.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5062-1>https://ubuntu.com/security/notices/USN-5062-1</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-1>https://ubuntu.com/security/notices/USN-5071-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-2>https://ubuntu.com/security/notices/USN-5071-2</a><br><a href=https://ubuntu.com/security/notices/USN-5072-1>https://ubuntu.com/security/notices/USN-5072-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-1>https://ubuntu.com/security/notices/USN-5073-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-2>https://ubuntu.com/security/notices/USN-5073-2</a><br><a href=https://ubuntu.com/security/notices/USN-5082-1>https://ubuntu.com/security/notices/USN-5082-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/08/16/1>https://www.openwall.com/lists/oss-security/2021/08/16/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3656</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1983988">https://bugzilla.redhat.com/show_bug.cgi?id=1983988</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656</a><br><a href="https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc">https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc</a><br><a href=https://github.com/torvalds/linux/commit/89c8a4984fc9>https://github.com/torvalds/linux/commit/89c8a4984fc9</a><br><a href=https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc>https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3656.html>https://linux.oracle.com/cve/CVE-2021-3656.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-1>https://ubuntu.com/security/notices/USN-5071-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-2>https://ubuntu.com/security/notices/USN-5071-2</a><br><a href=https://ubuntu.com/security/notices/USN-5072-1>https://ubuntu.com/security/notices/USN-5072-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-1>https://ubuntu.com/security/notices/USN-5073-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-2>https://ubuntu.com/security/notices/USN-5073-2</a><br><a href=https://ubuntu.com/security/notices/USN-5082-1>https://ubuntu.com/security/notices/USN-5082-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/08/16/1>https://www.openwall.com/lists/oss-security/2021/08/16/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4002</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025726">https://bugzilla.redhat.com/show_bug.cgi?id=2025726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002</a><br><a href=https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890>https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5206-1>https://ubuntu.com/security/notices/USN-5206-1</a><br><a href=https://ubuntu.com/security/notices/USN-5207-1>https://ubuntu.com/security/notices/USN-5207-1</a><br><a href=https://ubuntu.com/security/notices/USN-5208-1>https://ubuntu.com/security/notices/USN-5208-1</a><br><a href=https://ubuntu.com/security/notices/USN-5209-1>https://ubuntu.com/security/notices/USN-5209-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br><a href=https://ubuntu.com/security/notices/USN-5211-1>https://ubuntu.com/security/notices/USN-5211-1</a><br><a href=https://ubuntu.com/security/notices/USN-5218-1>https://ubuntu.com/security/notices/USN-5218-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://www.openwall.com/lists/oss-security/2021/11/25/1>https://www.openwall.com/lists/oss-security/2021/11/25/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0001</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-104.118</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/18/2>http://www.openwall.com/lists/oss-security/2022/03/18/2</a><br><a href=https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250>https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001</a><br><a href=https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html>https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href=https://ubuntu.com/security/notices/USN-5317-1>https://ubuntu.com/security/notices/USN-5317-1</a><br><a href=https://ubuntu.com/security/notices/USN-5318-1>https://ubuntu.com/security/notices/USN-5318-1</a><br><a href=https://ubuntu.com/security/notices/USN-5319-1>https://ubuntu.com/security/notices/USN-5319-1</a><br><a href=https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI>https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a><br><a href=https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html>https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href=https://www.vusec.net/projects/bhi-spectre-bhb/ >https://www.vusec.net/projects/bhi-spectre-bhb/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0002</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-104.118</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/18/2>http://www.openwall.com/lists/oss-security/2022/03/18/2</a><br><a href=https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250>https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002</a><br><a href=https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html>https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href=https://ubuntu.com/security/notices/USN-5317-1>https://ubuntu.com/security/notices/USN-5317-1</a><br><a href=https://ubuntu.com/security/notices/USN-5318-1>https://ubuntu.com/security/notices/USN-5318-1</a><br><a href=https://ubuntu.com/security/notices/USN-5319-1>https://ubuntu.com/security/notices/USN-5319-1</a><br><a href=https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI>https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a><br><a href=https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html>https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html</a><br><a href=https://www.vusec.net/projects/bhi-spectre-bhb/ >https://www.vusec.net/projects/bhi-spectre-bhb/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0185</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-96.109</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756</a><br><a href=https://github.com/Crusaders-of-Rust/CVE-2022-0185>https://github.com/Crusaders-of-Rust/CVE-2022-0185</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0185.html>https://linux.oracle.com/cve/CVE-2022-0185.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9148.html>https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0003/ >https://security.netapp.com/advisory/ntap-20220225-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5240-1>https://ubuntu.com/security/notices/USN-5240-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/18/7>https://www.openwall.com/lists/oss-security/2022/01/18/7</a><br><a href=https://www.willsroot.io/2022/01/cve-2022-0185.html>https://www.willsroot.io/2022/01/cve-2022-0185.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0492</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html>http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2051505">https://bugzilla.redhat.com/show_bug.cgi?id=2051505</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0492.html>https://linux.oracle.com/cve/CVE-2022-0492.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5302-1>https://ubuntu.com/security/notices/USN-5302-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://ubuntu.com/security/notices/USN-5339-1>https://ubuntu.com/security/notices/USN-5339-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2022/dsa-5095>https://www.debian.org/security/2022/dsa-5095</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://www.openwall.com/lists/oss-security/2022/02/04/1>https://www.openwall.com/lists/oss-security/2022/02/04/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23960</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-104.118</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/18/2>http://www.openwall.com/lists/oss-security/2022/03/18/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960</a><br><a href=https://developer.arm.com/documentation/ka004995/latest/ >https://developer.arm.com/documentation/ka004995/latest/</a><br><a href=https://developer.arm.com/support/arm-security-updates>https://developer.arm.com/support/arm-security-updates</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href=https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb>https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23960.html>https://linux.oracle.com/cve/CVE-2022-23960.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://ubuntu.com/security/notices/USN-5317-1>https://ubuntu.com/security/notices/USN-5317-1</a><br><a href=https://ubuntu.com/security/notices/USN-5318-1>https://ubuntu.com/security/notices/USN-5318-1</a><br><a href=https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI>https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a><br><a href=https://www.vusec.net/projects/bhi-spectre-bhb/ >https://www.vusec.net/projects/bhi-spectre-bhb/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-25636</td> <td align=center>HIGH</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-104.118</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html>http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html</a><br><a href=http://www.openwall.com/lists/oss-security/2022/02/22/1>http://www.openwall.com/lists/oss-security/2022/02/22/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6">https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6</a><br><a href=https://github.com/Bonfee/CVE-2022-25636>https://github.com/Bonfee/CVE-2022-25636</a><br><a href=https://linux.oracle.com/cve/CVE-2022-25636.html>https://linux.oracle.com/cve/CVE-2022-25636.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ >https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/</a><br><a href=https://security.netapp.com/advisory/ntap-20220325-0002/ >https://security.netapp.com/advisory/ntap-20220325-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5317-1>https://ubuntu.com/security/notices/USN-5317-1</a><br><a href=https://ubuntu.com/security/notices/USN-5318-1>https://ubuntu.com/security/notices/USN-5318-1</a><br><a href=https://www.debian.org/security/2022/dsa-5095>https://www.debian.org/security/2022/dsa-5095</a><br><a href=https://www.openwall.com/lists/oss-security/2022/02/21/2>https://www.openwall.com/lists/oss-security/2022/02/21/2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2013-7445</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.kernel.org/show_bug.cgi?id=60533">https://bugzilla.kernel.org/show_bug.cgi?id=60533</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445</a><br><a href="https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)">https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2015-8553</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)">http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)</a><br><a href=http://xenbits.xen.org/xsa/advisory-120.html>http://xenbits.xen.org/xsa/advisory-120.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553</a><br><a href=https://seclists.org/bugtraq/2019/Aug/18>https://seclists.org/bugtraq/2019/Aug/18</a><br><a href=https://www.debian.org/security/2019/dsa-4497>https://www.debian.org/security/2019/dsa-4497</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2016-8660</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2016/10/13/8>http://www.openwall.com/lists/oss-security/2016/10/13/8</a><br><a href=http://www.securityfocus.com/bid/93558>http://www.securityfocus.com/bid/93558</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1384851">https://bugzilla.redhat.com/show_bug.cgi?id=1384851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660</a><br><a href=https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/ >https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/</a><br><a href="https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2">https://marc.info/?l=linux-fsdevel&amp;m=147639177409294&amp;w=2</a><br><a href="https://marc.info/?l=linux-xfs&m=149498118228320&w=2">https://marc.info/?l=linux-xfs&amp;m=149498118228320&amp;w=2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2018-17977</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/105539>http://www.securityfocus.com/bid/105539</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1111609">https://bugzilla.suse.com/show_bug.cgi?id=1111609</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977</a><br><a href=https://www.openwall.com/lists/oss-security/2018/10/05/5>https://www.openwall.com/lists/oss-security/2018/10/05/5</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-12362</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362</a><br><a href=https://linux.oracle.com/cve/CVE-2020-12362.html>https://linux.oracle.com/cve/CVE-2020-12362.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9434.html>https://linux.oracle.com/errata/ELSA-2021-9434.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-24504</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504</a><br><a href=https://linux.oracle.com/cve/CVE-2020-24504.html>https://linux.oracle.com/cve/CVE-2020-24504.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4356.html>https://linux.oracle.com/errata/ELSA-2021-4356.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-26541</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541</a><br><a href=https://linux.oracle.com/cve/CVE-2020-26541.html>https://linux.oracle.com/cve/CVE-2020-26541.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2570.html>https://linux.oracle.com/errata/ELSA-2021-2570.html</a><br><a href=https://lkml.org/lkml/2020/9/15/1871>https://lkml.org/lkml/2020/9/15/1871</a><br><a href=https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/ >https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/</a><br><a href=https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/ >https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/</a><br><a href=https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/ >https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/</a><br><a href=https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/ >https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5106-1>https://ubuntu.com/security/notices/USN-5106-1</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-26555</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-80.90</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1918601">https://bugzilla.redhat.com/show_bug.cgi?id=1918601</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555</a><br><a href=https://kb.cert.org/vuls/id/799380>https://kb.cert.org/vuls/id/799380</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/ >https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/</a><br><a href=https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ >https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-26558</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-80.90</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558</a><br><a href=https://kb.cert.org/vuls/id/799380>https://kb.cert.org/vuls/id/799380</a><br><a href=https://linux.oracle.com/cve/CVE-2020-26558.html>https://linux.oracle.com/cve/CVE-2020-26558.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4432.html>https://linux.oracle.com/errata/ELSA-2021-4432.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/</a><br><a href=https://ubuntu.com/security/notices/USN-4989-1>https://ubuntu.com/security/notices/USN-4989-1</a><br><a href=https://ubuntu.com/security/notices/USN-4989-2>https://ubuntu.com/security/notices/USN-4989-2</a><br><a href=https://ubuntu.com/security/notices/USN-5017-1>https://ubuntu.com/security/notices/USN-5017-1</a><br><a href=https://ubuntu.com/security/notices/USN-5018-1>https://ubuntu.com/security/notices/USN-5018-1</a><br><a href=https://ubuntu.com/security/notices/USN-5046-1>https://ubuntu.com/security/notices/USN-5046-1</a><br><a href=https://ubuntu.com/security/notices/USN-5050-1>https://ubuntu.com/security/notices/USN-5050-1</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/ >https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/</a><br><a href=https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ >https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-27835</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1901709">https://bugzilla.redhat.com/show_bug.cgi?id=1901709</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835</a><br><a href=https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79>https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79</a><br><a href=https://linux.oracle.com/cve/CVE-2020-27835.html>https://linux.oracle.com/cve/CVE-2020-27835.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-1578.html>https://linux.oracle.com/errata/ELSA-2021-1578.html</a><br><a href=https://ubuntu.com/security/notices/USN-4751-1>https://ubuntu.com/security/notices/USN-4751-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-36310</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148">https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310</a><br><a href=https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e>https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e</a><br><a href=https://linux.oracle.com/cve/CVE-2020-36310.html>https://linux.oracle.com/cve/CVE-2020-36310.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9307.html>https://linux.oracle.com/errata/ELSA-2021-9307.html</a><br><a href=https://www.debian.org/security/2022/dsa-5095>https://www.debian.org/security/2022/dsa-5095</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-36311</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311</a><br><a href=https://git.kernel.org/linus/7be74942f184fdfba34ddd19a0d995deb34d4a03>https://git.kernel.org/linus/7be74942f184fdfba34ddd19a0d995deb34d4a03</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03</a><br><a href=https://linux.oracle.com/cve/CVE-2020-36311.html>https://linux.oracle.com/cve/CVE-2020-36311.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9451.html>https://linux.oracle.com/errata/ELSA-2021-9451.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html</a><br><a href=https://ubuntu.com/security/notices/USN-5071-1>https://ubuntu.com/security/notices/USN-5071-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-2>https://ubuntu.com/security/notices/USN-5071-2</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-36385</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385</a><br><a href=https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1>https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1</a><br><a href=https://linux.oracle.com/cve/CVE-2020-36385.html>https://linux.oracle.com/cve/CVE-2020-36385.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4777.html>https://linux.oracle.com/errata/ELSA-2021-4777.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210720-0004/ >https://security.netapp.com/advisory/ntap-20210720-0004/</a><br><a href=https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2>https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2</a><br><a href="https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6">https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-3702</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-89.100</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href="https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/">https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/</a><br><a href=https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928>https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5114-1>https://ubuntu.com/security/notices/USN-5114-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-1>https://ubuntu.com/security/notices/USN-5116-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-2>https://ubuntu.com/security/notices/USN-5116-2</a><br><a href=https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58>https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58</a><br><a href=https://www.debian.org/security/2021/dsa-4978>https://www.debian.org/security/2021/dsa-4978</a><br><a href=https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin>https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-0129</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-80.90</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129</a><br><a href="https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738">https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f</a><br><a href=https://linux.oracle.com/cve/CVE-2021-0129.html>https://linux.oracle.com/cve/CVE-2021-0129.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9088.html>https://linux.oracle.com/errata/ELSA-2022-9088.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210716-0002/ >https://security.netapp.com/advisory/ntap-20210716-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5017-1>https://ubuntu.com/security/notices/USN-5017-1</a><br><a href=https://ubuntu.com/security/notices/USN-5018-1>https://ubuntu.com/security/notices/USN-5018-1</a><br><a href=https://ubuntu.com/security/notices/USN-5046-1>https://ubuntu.com/security/notices/USN-5046-1</a><br><a href=https://ubuntu.com/security/notices/USN-5050-1>https://ubuntu.com/security/notices/USN-5050-1</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2021/dsa-4951>https://www.debian.org/security/2021/dsa-4951</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-0920</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920</a><br><a href=https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca>https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca</a><br><a href=https://linux.oracle.com/cve/CVE-2021-0920.html>https://linux.oracle.com/cve/CVE-2021-0920.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9014.html>https://linux.oracle.com/errata/ELSA-2022-9014.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://source.android.com/security/bulletin/2021-11-01>https://source.android.com/security/bulletin/2021-11-01</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-20320</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2010090">https://bugzilla.redhat.com/show_bug.cgi?id=2010090</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320</a><br><a href=https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/ >https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-20321</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013242">https://bugzilla.redhat.com/show_bug.cgi?id=2013242</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321</a><br><a href="https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)">https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)</a><br><a href=https://linux.oracle.com/cve/CVE-2021-20321.html>https://linux.oracle.com/cve/CVE-2021-20321.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9088.html>https://linux.oracle.com/errata/ELSA-2022-9088.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/ >https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/</a><br><a href=https://ubuntu.com/security/notices/USN-5208-1>https://ubuntu.com/security/notices/USN-5208-1</a><br><a href=https://ubuntu.com/security/notices/USN-5209-1>https://ubuntu.com/security/notices/USN-5209-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br><a href=https://ubuntu.com/security/notices/USN-5218-1>https://ubuntu.com/security/notices/USN-5218-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-20322</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2014230">https://bugzilla.redhat.com/show_bug.cgi?id=2014230</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&amp;id=4785305c05b25a242e5314cc821f54ade4c18810</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&amp;id=6457378fe796815c973f631a1904e147d6ee33b1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&amp;id=67d6d681e15b578c1725bad8ad079e05d1c48a8e</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&amp;id=a00df2caffed3883c341d5685f830434312e4a43</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220303-0002/ >https://security.netapp.com/advisory/ntap-20220303-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5268-1>https://ubuntu.com/security/notices/USN-5268-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-22543</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/06/26/1>http://www.openwall.com/lists/oss-security/2021/06/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543</a><br><a href=https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584>https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584</a><br><a href=https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97>https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22543.html>https://linux.oracle.com/cve/CVE-2021-22543.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9453.html>https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/</a><br><a href=https://security.netapp.com/advisory/ntap-20210708-0002/ >https://security.netapp.com/advisory/ntap-20210708-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-1>https://ubuntu.com/security/notices/USN-5071-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-2>https://ubuntu.com/security/notices/USN-5071-2</a><br><a href=https://ubuntu.com/security/notices/USN-5071-3>https://ubuntu.com/security/notices/USN-5071-3</a><br><a href=https://ubuntu.com/security/notices/USN-5094-1>https://ubuntu.com/security/notices/USN-5094-1</a><br><a href=https://ubuntu.com/security/notices/USN-5094-2>https://ubuntu.com/security/notices/USN-5094-2</a><br><a href=https://ubuntu.com/security/notices/USN-5106-1>https://ubuntu.com/security/notices/USN-5106-1</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/05/26/3>https://www.openwall.com/lists/oss-security/2021/05/26/3</a><br><a href=https://www.openwall.com/lists/oss-security/2021/05/26/4>https://www.openwall.com/lists/oss-security/2021/05/26/4</a><br><a href=https://www.openwall.com/lists/oss-security/2021/05/26/5>https://www.openwall.com/lists/oss-security/2021/05/26/5</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-22600</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5266-1>https://ubuntu.com/security/notices/USN-5266-1</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5295-1>https://ubuntu.com/security/notices/USN-5295-1</a><br><a href=https://ubuntu.com/security/notices/USN-5295-2>https://ubuntu.com/security/notices/USN-5295-2</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-26932</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://xenbits.xen.org/xsa/advisory-361.html>http://xenbits.xen.org/xsa/advisory-361.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932</a><br><a href=https://linux.oracle.com/cve/CVE-2021-26932.html>https://linux.oracle.com/cve/CVE-2021-26932.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9136.html>https://linux.oracle.com/errata/ELSA-2021-9136.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html>https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/</a><br><a href=https://security.netapp.com/advisory/ntap-20210326-0001/ >https://security.netapp.com/advisory/ntap-20210326-0001/</a><br><a href=https://www.openwall.com/lists/oss-security/2021/02/16/3>https://www.openwall.com/lists/oss-security/2021/02/16/3</a><br><a href=https://xenbits.xen.org/xsa/advisory-361.html>https://xenbits.xen.org/xsa/advisory-361.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-28714</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://xenbits.xen.org/xsa/advisory-392.html>https://xenbits.xen.org/xsa/advisory-392.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-392.txt>https://xenbits.xenproject.org/xsa/advisory-392.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-28715</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://xenbits.xen.org/xsa/advisory-392.html>https://xenbits.xen.org/xsa/advisory-392.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-392.txt>https://xenbits.xenproject.org/xsa/advisory-392.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-33098</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-80.90</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098</a><br><a href=https://security.netapp.com/advisory/ntap-20211210-0005/ >https://security.netapp.com/advisory/ntap-20211210-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-33624</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/06/21/1>http://www.openwall.com/lists/oss-security/2021/06/21/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e</a><br><a href=https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db>https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://ubuntu.com/security/notices/USN-5091-1>https://ubuntu.com/security/notices/USN-5091-1</a><br><a href=https://ubuntu.com/security/notices/USN-5091-2>https://ubuntu.com/security/notices/USN-5091-2</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/06/21/1>https://www.openwall.com/lists/oss-security/2021/06/21/1</a><br><a href=https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner>https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-34556</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/01/3>http://www.openwall.com/lists/oss-security/2021/08/01/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://www.openwall.com/lists/oss-security/2021/08/01/3>https://www.openwall.com/lists/oss-security/2021/08/01/3</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-35477</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://www.openwall.com/lists/oss-security/2021/08/01/3>https://www.openwall.com/lists/oss-security/2021/08/01/3</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3564</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-81.91</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/05/25/1>http://www.openwall.com/lists/oss-security/2021/05/25/1</a><br><a href=http://www.openwall.com/lists/oss-security/2021/06/01/2>http://www.openwall.com/lists/oss-security/2021/06/01/2</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1964139">https://bugzilla.redhat.com/show_bug.cgi?id=1964139</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3564.html>https://linux.oracle.com/cve/CVE-2021-3564.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0620.html>https://linux.oracle.com/errata/ELSA-2022-0620.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html>https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html</a><br><a href=https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/ >https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/</a><br><a href=https://ubuntu.com/security/notices/USN-5015-1>https://ubuntu.com/security/notices/USN-5015-1</a><br><a href=https://ubuntu.com/security/notices/USN-5044-1>https://ubuntu.com/security/notices/USN-5044-1</a><br><a href=https://ubuntu.com/security/notices/USN-5045-1>https://ubuntu.com/security/notices/USN-5045-1</a><br><a href=https://ubuntu.com/security/notices/USN-5046-1>https://ubuntu.com/security/notices/USN-5046-1</a><br><a href=https://ubuntu.com/security/notices/USN-5050-1>https://ubuntu.com/security/notices/USN-5050-1</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/05/25/1>https://www.openwall.com/lists/oss-security/2021/05/25/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3573</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-81.91</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1966578">https://bugzilla.redhat.com/show_bug.cgi?id=1966578</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52">https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3573.html>https://linux.oracle.com/cve/CVE-2021-3573.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0620.html>https://linux.oracle.com/errata/ELSA-2022-0620.html</a><br><a href=https://ubuntu.com/security/notices/USN-5015-1>https://ubuntu.com/security/notices/USN-5015-1</a><br><a href=https://ubuntu.com/security/notices/USN-5044-1>https://ubuntu.com/security/notices/USN-5044-1</a><br><a href=https://ubuntu.com/security/notices/USN-5045-1>https://ubuntu.com/security/notices/USN-5045-1</a><br><a href=https://ubuntu.com/security/notices/USN-5046-1>https://ubuntu.com/security/notices/USN-5046-1</a><br><a href=https://ubuntu.com/security/notices/USN-5050-1>https://ubuntu.com/security/notices/USN-5050-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/06/08/2>https://www.openwall.com/lists/oss-security/2021/06/08/2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3612</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1974079">https://bugzilla.redhat.com/show_bug.cgi?id=1974079</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3612.html>https://linux.oracle.com/cve/CVE-2021-3612.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9453.html>https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/</a><br><a href=https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/ >https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/</a><br><a href=https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u>https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u</a><br><a href=https://security.netapp.com/advisory/ntap-20210805-0005/ >https://security.netapp.com/advisory/ntap-20210805-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-1>https://ubuntu.com/security/notices/USN-5071-1</a><br><a href=https://ubuntu.com/security/notices/USN-5071-2>https://ubuntu.com/security/notices/USN-5071-2</a><br><a href=https://ubuntu.com/security/notices/USN-5071-3>https://ubuntu.com/security/notices/USN-5071-3</a><br><a href=https://ubuntu.com/security/notices/USN-5073-1>https://ubuntu.com/security/notices/USN-5073-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-2>https://ubuntu.com/security/notices/USN-5073-2</a><br><a href=https://ubuntu.com/security/notices/USN-5073-3>https://ubuntu.com/security/notices/USN-5073-3</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5106-1>https://ubuntu.com/security/notices/USN-5106-1</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3640</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-97.110</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1980646">https://bugzilla.redhat.com/show_bug.cgi?id=1980646</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951">https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&amp;id=99c23da0eed4fd20cae8243f2b51e10e66aa0951</a><br><a href=https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951>https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3640.html>https://linux.oracle.com/cve/CVE-2021-3640.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9148.html>https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lkml.org/lkml/2021/8/28/238>https://lkml.org/lkml/2021/8/28/238</a><br><a href=https://ubuntu.com/security/CVE-2021-3640>https://ubuntu.com/security/CVE-2021-3640</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://ubuntu.com/security/notices/USN-5267-1>https://ubuntu.com/security/notices/USN-5267-1</a><br><a href=https://ubuntu.com/security/notices/USN-5267-3>https://ubuntu.com/security/notices/USN-5267-3</a><br><a href=https://ubuntu.com/security/notices/USN-5268-1>https://ubuntu.com/security/notices/USN-5268-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/22/1>https://www.openwall.com/lists/oss-security/2021/07/22/1</a><br><a href=https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/ >https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/</a><br><a href=https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/ >https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/</a><br><a href=https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/ >https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3655</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-91.102</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1984024">https://bugzilla.redhat.com/show_bug.cgi?id=1984024</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3655.html>https://linux.oracle.com/cve/CVE-2021-3655.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9488.html>https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/ >https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/</a><br><a href=https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/ >https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5161-1>https://ubuntu.com/security/notices/USN-5161-1</a><br><a href=https://ubuntu.com/security/notices/USN-5162-1>https://ubuntu.com/security/notices/USN-5162-1</a><br><a href=https://ubuntu.com/security/notices/USN-5163-1>https://ubuntu.com/security/notices/USN-5163-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3732</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-89.100</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995249">https://bugzilla.redhat.com/show_bug.cgi?id=1995249</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732</a><br><a href=https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631>https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631</a><br><a href=https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631>https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3732.html>https://linux.oracle.com/cve/CVE-2021-3732.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9577.html>https://linux.oracle.com/errata/ELSA-2021-9577.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3732>https://ubuntu.com/security/CVE-2021-3732</a><br><a href=https://ubuntu.com/security/notices/USN-5094-1>https://ubuntu.com/security/notices/USN-5094-1</a><br><a href=https://ubuntu.com/security/notices/USN-5094-2>https://ubuntu.com/security/notices/USN-5094-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-1>https://ubuntu.com/security/notices/USN-5116-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-2>https://ubuntu.com/security/notices/USN-5116-2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3743</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1997961">https://bugzilla.redhat.com/show_bug.cgi?id=1997961</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=194ccc88297ae78d0803adad83c6dcc369787c9e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=194ccc88297ae78d0803adad83c6dcc369787c9e</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9d24c9429e2159d1e279dc3a83191ccb4daf1d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9d24c9429e2159d1e279dc3a83191ccb4daf1d</a><br><a href=https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117>https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3743.html>https://linux.oracle.com/cve/CVE-2021-3743.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9475.html>https://linux.oracle.com/errata/ELSA-2021-9475.html</a><br><a href=https://lists.openwall.net/netdev/2021/08/17/124>https://lists.openwall.net/netdev/2021/08/17/124</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5117-1>https://ubuntu.com/security/notices/USN-5117-1</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://www.openwall.com/lists/oss-security/2021/08/27/2>https://www.openwall.com/lists/oss-security/2021/08/27/2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3752</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-97.110</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1999544">https://bugzilla.redhat.com/show_bug.cgi?id=1999544</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3752.html>https://linux.oracle.com/cve/CVE-2021-3752.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9148.html>https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ >https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0009/ >https://security.netapp.com/advisory/ntap-20220318-0009/</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://ubuntu.com/security/notices/USN-5267-1>https://ubuntu.com/security/notices/USN-5267-1</a><br><a href=https://ubuntu.com/security/notices/USN-5267-3>https://ubuntu.com/security/notices/USN-5267-3</a><br><a href=https://ubuntu.com/security/notices/USN-5268-1>https://ubuntu.com/security/notices/USN-5268-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://www.openwall.com/lists/oss-security/2021/09/15/4>https://www.openwall.com/lists/oss-security/2021/09/15/4</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3753</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1999589">https://bugzilla.redhat.com/show_bug.cgi?id=1999589</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753</a><br><a href=https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7>https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7</a><br><a href=https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7>https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3753.html>https://linux.oracle.com/cve/CVE-2021-3753.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9088.html>https://linux.oracle.com/errata/ELSA-2022-9088.html</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5117-1>https://ubuntu.com/security/notices/USN-5117-1</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://www.openwall.com/lists/oss-security/2021/09/01/4>https://www.openwall.com/lists/oss-security/2021/09/01/4</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-37576</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/07/27/2>http://www.openwall.com/lists/oss-security/2021/07/27/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576</a><br><a href="https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)">https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-37576.html>https://linux.oracle.com/cve/CVE-2021-37576.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3801.html>https://linux.oracle.com/errata/ELSA-2021-3801.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/</a><br><a href=https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u>https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u</a><br><a href=https://security.netapp.com/advisory/ntap-20210917-0005/ >https://security.netapp.com/advisory/ntap-20210917-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5091-1>https://ubuntu.com/security/notices/USN-5091-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5094-1>https://ubuntu.com/security/notices/USN-5094-1</a><br><a href=https://www.debian.org/security/2021/dsa-4978>https://www.debian.org/security/2021/dsa-4978</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/26/1>https://www.openwall.com/lists/oss-security/2021/07/26/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3759</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759</a><br><a href=https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ >https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5117-1>https://ubuntu.com/security/notices/USN-5117-1</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://ubuntu.com/security/notices/USN-5135-1>https://ubuntu.com/security/notices/USN-5135-1</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3760</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2000585">https://bugzilla.redhat.com/show_bug.cgi?id=2000585</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220318-0007/ >https://security.netapp.com/advisory/ntap-20220318-0007/</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5165-1>https://ubuntu.com/security/notices/USN-5165-1</a><br><a href=https://ubuntu.com/security/notices/USN-5208-1>https://ubuntu.com/security/notices/USN-5208-1</a><br><a href=https://ubuntu.com/security/notices/USN-5209-1>https://ubuntu.com/security/notices/USN-5209-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br><a href=https://ubuntu.com/security/notices/USN-5218-1>https://ubuntu.com/security/notices/USN-5218-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://www.openwall.com/lists/oss-security/2021/10/26/2>https://www.openwall.com/lists/oss-security/2021/10/26/2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3764</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-91.102</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5140-1>https://ubuntu.com/security/notices/USN-5140-1</a><br><a href=https://ubuntu.com/security/notices/USN-5161-1>https://ubuntu.com/security/notices/USN-5161-1</a><br><a href=https://ubuntu.com/security/notices/USN-5162-1>https://ubuntu.com/security/notices/USN-5162-1</a><br><a href=https://ubuntu.com/security/notices/USN-5163-1>https://ubuntu.com/security/notices/USN-5163-1</a><br><a href=https://ubuntu.com/security/notices/USN-5164-1>https://ubuntu.com/security/notices/USN-5164-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38160</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/cve-2021-38160>https://access.redhat.com/security/cve/cve-2021-38160</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160</a><br><a href=https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46>https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46</a><br><a href=https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46>https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46</a><br><a href=https://linux.oracle.com/cve/CVE-2021-38160.html>https://linux.oracle.com/cve/CVE-2021-38160.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9488.html>https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0010/ >https://security.netapp.com/advisory/ntap-20210902-0010/</a><br><a href=https://ubuntu.com/security/notices/USN-5073-1>https://ubuntu.com/security/notices/USN-5073-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-2>https://ubuntu.com/security/notices/USN-5073-2</a><br><a href=https://ubuntu.com/security/notices/USN-5073-3>https://ubuntu.com/security/notices/USN-5073-3</a><br><a href=https://ubuntu.com/security/notices/USN-5091-1>https://ubuntu.com/security/notices/USN-5091-1</a><br><a href=https://ubuntu.com/security/notices/USN-5091-2>https://ubuntu.com/security/notices/USN-5091-2</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5106-1>https://ubuntu.com/security/notices/USN-5106-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2021/dsa-4978>https://www.debian.org/security/2021/dsa-4978</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38198</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-89.100</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198</a><br><a href=https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7>https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7</a><br><a href=https://linux.oracle.com/cve/CVE-2021-38198.html>https://linux.oracle.com/cve/CVE-2021-38198.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9475.html>https://linux.oracle.com/errata/ELSA-2021-9475.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5114-1>https://ubuntu.com/security/notices/USN-5114-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-1>https://ubuntu.com/security/notices/USN-5116-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-2>https://ubuntu.com/security/notices/USN-5116-2</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38199</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c</a><br><a href=https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c>https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0010/ >https://security.netapp.com/advisory/ntap-20210902-0010/</a><br><a href=https://ubuntu.com/security/notices/USN-5091-1>https://ubuntu.com/security/notices/USN-5091-1</a><br><a href=https://ubuntu.com/security/notices/USN-5091-2>https://ubuntu.com/security/notices/USN-5091-2</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5106-1>https://ubuntu.com/security/notices/USN-5106-1</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://www.debian.org/security/2021/dsa-4978>https://www.debian.org/security/2021/dsa-4978</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38207</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-81.91</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207</a><br><a href=https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d>https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0007/ >https://security.netapp.com/advisory/ntap-20210902-0007/</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38208</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-81.91</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/17/1>http://www.openwall.com/lists/oss-security/2021/08/17/1</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/2>http://www.openwall.com/lists/oss-security/2021/08/17/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/24/2>http://www.openwall.com/lists/oss-security/2021/08/24/2</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1992810">https://bugzilla.redhat.com/show_bug.cgi?id=1992810</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208</a><br><a href=https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba>https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba</a><br><a href=https://ubuntu.com/security/notices/USN-5050-1>https://ubuntu.com/security/notices/USN-5050-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3864</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864</a><br><a href=https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com>https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com</a><br><a href=https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/ >https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/</a><br><a href=https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com>https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com</a><br><a href=https://www.openwall.com/lists/oss-security/2021/10/20/2>https://www.openwall.com/lists/oss-security/2021/10/20/2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-39633</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633</a><br><a href="https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14)">https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14)</a><br><a href=https://source.android.com/security/bulletin/2022-01-01>https://source.android.com/security/bulletin/2022-01-01</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-39685</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&amp;id=36dfdf11af49d3c009c711fb16f5c6e7a274505d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&amp;id=6eea4ace62fa6414432692ee44f0c0a3d541d97a</a><br><a href=https://github.com/szymonh/inspector-gadget>https://github.com/szymonh/inspector-gadget</a><br><a href=https://gitlab.com/postmarketOS/pmaports/-/issues/1346>https://gitlab.com/postmarketOS/pmaports/-/issues/1346</a><br><a href=https://linux.oracle.com/cve/CVE-2021-39685.html>https://linux.oracle.com/cve/CVE-2021-39685.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://source.android.com/security/bulletin/2022-03-01>https://source.android.com/security/bulletin/2022-03-01</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/12/15/4>https://www.openwall.com/lists/oss-security/2021/12/15/4</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4001</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025645">https://bugzilla.redhat.com/show_bug.cgi?id=2025645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001</a><br><a href=https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53>https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53">https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53</a><br><a href=https://ubuntu.com/security/notices/USN-5207-1>https://ubuntu.com/security/notices/USN-5207-1</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4037</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2021-4037>https://access.redhat.com/security/cve/CVE-2021-4037</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-40490</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-89.100</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa">https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa</a><br><a href=https://linux.oracle.com/cve/CVE-2021-40490.html>https://linux.oracle.com/cve/CVE-2021-40490.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9488.html>https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/</a><br><a href=https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/ >https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/</a><br><a href=https://security.netapp.com/advisory/ntap-20211004-0001/ >https://security.netapp.com/advisory/ntap-20211004-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5114-1>https://ubuntu.com/security/notices/USN-5114-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-1>https://ubuntu.com/security/notices/USN-5116-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-2>https://ubuntu.com/security/notices/USN-5116-2</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2021/dsa-4978>https://www.debian.org/security/2021/dsa-4978</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4083</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2029923">https://bugzilla.redhat.com/show_bug.cgi?id=2029923</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083</a><br><a href="https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)">https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220217-0005/ >https://security.netapp.com/advisory/ntap-20220217-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5295-1>https://ubuntu.com/security/notices/USN-5295-1</a><br><a href=https://ubuntu.com/security/notices/USN-5295-2>https://ubuntu.com/security/notices/USN-5295-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4135</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135</a><br><a href="https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)">https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4148</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2026487">https://bugzilla.redhat.com/show_bug.cgi?id=2026487</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148</a><br><a href=https://lkml.org/lkml/2021/9/12/323>https://lkml.org/lkml/2021/9/12/323</a><br><a href=https://lkml.org/lkml/2021/9/17/1037>https://lkml.org/lkml/2021/9/17/1037</a><br><a href=https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/ >https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/</a><br><a href=https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/ >https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/</a><br><a href=https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/ >https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4149</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2026485">https://bugzilla.redhat.com/show_bug.cgi?id=2026485</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149</a><br><a href="https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)">https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)</a><br><a href=https://lkml.org/lkml/2021/10/18/885>https://lkml.org/lkml/2021/10/18/885</a><br><a href=https://lkml.org/lkml/2021/9/13/2565>https://lkml.org/lkml/2021/9/13/2565</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4150</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025938">https://bugzilla.redhat.com/show_bug.cgi?id=2025938</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150</a><br><a href="https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)">https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)</a><br><a href=https://lkml.org/lkml/2021/10/18/485>https://lkml.org/lkml/2021/10/18/485</a><br><a href=https://lkml.org/lkml/2021/9/6/781>https://lkml.org/lkml/2021/9/6/781</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4154</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2034514">https://bugzilla.redhat.com/show_bug.cgi?id=2034514</a><br><a href=https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002>https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154</a><br><a href="https://git.kernel.org/linus/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b (5.14-rc2)">https://git.kernel.org/linus/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b (5.14-rc2)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4154.html>https://linux.oracle.com/cve/CVE-2021-4154.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0825.html>https://linux.oracle.com/errata/ELSA-2022-0825.html</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0004/ >https://security.netapp.com/advisory/ntap-20220225-0004/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4155</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155</a><br><a href="https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)">https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4155.html>https://linux.oracle.com/cve/CVE-2021-4155.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9148.html>https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5295-1>https://ubuntu.com/security/notices/USN-5295-1</a><br><a href=https://ubuntu.com/security/notices/USN-5295-2>https://ubuntu.com/security/notices/USN-5295-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/1>https://www.openwall.com/lists/oss-security/2022/01/10/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4157</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-80.90</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2034342">https://bugzilla.redhat.com/show_bug.cgi?id=2034342</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157</a><br><a href="https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)">https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)</a><br><a href=https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/ >https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4159</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4197</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2035652">https://bugzilla.redhat.com/show_bug.cgi?id=2035652</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197</a><br><a href=https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/ >https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4202</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036682">https://bugzilla.redhat.com/show_bug.cgi?id=2036682</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4203</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-91.102</td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2230">https://bugs.chromium.org/p/project-zero/issues/detail?id=2230</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1">https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&amp;can=7&amp;q=modified-after%3Atoday-30&amp;sort=-modified&amp;colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&amp;cells=tiles&amp;redir=1</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2036934">https://bugzilla.redhat.com/show_bug.cgi?id=2036934</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203</a><br><a href="https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)">https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814</a><br><a href=https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/ >https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-4218</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-42252</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252</a><br><a href="https://git.kernel.org/linus/b49a0e69a7b1a68c8d3f64097d06dabb770fec96 (5.15-rc1)">https://git.kernel.org/linus/b49a0e69a7b1a68c8d3f64097d06dabb770fec96 (5.15-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96</a><br><a href=https://security.netapp.com/advisory/ntap-20211112-0006/ >https://security.netapp.com/advisory/ntap-20211112-0006/</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5161-1>https://ubuntu.com/security/notices/USN-5161-1</a><br><a href=https://ubuntu.com/security/notices/USN-5162-1>https://ubuntu.com/security/notices/USN-5162-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-42739</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-97.110</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e</a><br><a href=https://linux.oracle.com/cve/CVE-2021-42739.html>https://linux.oracle.com/cve/CVE-2021-42739.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0063.html>https://linux.oracle.com/errata/ELSA-2022-0063.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/</a><br><a href=https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/ >https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/</a><br><a href=https://seclists.org/oss-sec/2021/q2/46>https://seclists.org/oss-sec/2021/q2/46</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0001/ >https://security.netapp.com/advisory/ntap-20211118-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5165-1>https://ubuntu.com/security/notices/USN-5165-1</a><br><a href=https://ubuntu.com/security/notices/USN-5207-1>https://ubuntu.com/security/notices/USN-5207-1</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://ubuntu.com/security/notices/USN-5266-1>https://ubuntu.com/security/notices/USN-5266-1</a><br><a href=https://ubuntu.com/security/notices/USN-5267-1>https://ubuntu.com/security/notices/USN-5267-1</a><br><a href=https://ubuntu.com/security/notices/USN-5267-3>https://ubuntu.com/security/notices/USN-5267-3</a><br><a href=https://ubuntu.com/security/notices/USN-5268-1>https://ubuntu.com/security/notices/USN-5268-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-43056</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/28/1>http://www.openwall.com/lists/oss-security/2021/10/28/1</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056</a><br><a href=https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337>https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337</a><br><a href="https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)">https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/</a><br><a href=https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u>https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5165-1>https://ubuntu.com/security/notices/USN-5165-1</a><br><a href=https://ubuntu.com/security/notices/USN-5208-1>https://ubuntu.com/security/notices/USN-5208-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br><a href=https://ubuntu.com/security/notices/USN-5218-1>https://ubuntu.com/security/notices/USN-5218-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-43975</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/</a><br><a href=https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/ >https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/</a><br><a href=https://security.netapp.com/advisory/ntap-20211210-0001/ >https://security.netapp.com/advisory/ntap-20211210-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-44733</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2030747">https://bugzilla.redhat.com/show_bug.cgi?id=2030747</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733</a><br><a href=https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c>https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c</a><br><a href=https://github.com/pjlantz/optee-qemu/blob/main/README.md>https://github.com/pjlantz/optee-qemu/blob/main/README.md</a><br><a href=https://linux.oracle.com/cve/CVE-2021-44733.html>https://linux.oracle.com/cve/CVE-2021-44733.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9148.html>https://linux.oracle.com/errata/ELSA-2022-9148.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/ >https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/</a><br><a href=https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/ >https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/</a><br><a href=https://security.netapp.com/advisory/ntap-20220114-0003/ >https://security.netapp.com/advisory/ntap-20220114-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://ubuntu.com/security/notices/USN-5339-1>https://ubuntu.com/security/notices/USN-5339-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-44879</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.kernel.org/show_bug.cgi?id=215231">https://bugzilla.kernel.org/show_bug.cgi?id=215231</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f</a><br><a href=https://lkml.org/lkml/2022/1/24/4067>https://lkml.org/lkml/2022/1/24/4067</a><br><a href=https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/ >https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/</a><br><a href=https://ubuntu.com/security/notices/USN-5302-1>https://ubuntu.com/security/notices/USN-5302-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/02/12/1>https://www.openwall.com/lists/oss-security/2022/02/12/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-45095</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0</a><br><a href=https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0>https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/ >https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://ubuntu.com/security/notices/USN-5339-1>https://ubuntu.com/security/notices/USN-5339-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-45469</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/12/25/1>http://www.openwall.com/lists/oss-security/2021/12/25/1</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=215235">https://bugzilla.kernel.org/show_bug.cgi?id=215235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1">https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&amp;id=5598b24efaf4892741c798b425d543e4bed357a1</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/</a><br><a href=https://security.netapp.com/advisory/ntap-20220114-0003/ >https://security.netapp.com/advisory/ntap-20220114-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-45480</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480</a><br><a href=https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0>https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0</a><br><a href=https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0>https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-45485</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href=https://arxiv.org/pdf/2112.09604.pdf>https://arxiv.org/pdf/2112.09604.pdf</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485</a><br><a href="https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)">https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99</a><br><a href=https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/ >https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/</a><br><a href=https://security.netapp.com/advisory/ntap-20220121-0001/ >https://security.netapp.com/advisory/ntap-20220121-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0322</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2042822">https://bugzilla.redhat.com/show_bug.cgi?id=2042822</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322</a><br><a href="https://git.kernel.org/linus/a2d859e3fc97e79d907761550dbc03ff1b36479c (5.15-rc6)">https://git.kernel.org/linus/a2d859e3fc97e79d907761550dbc03ff1b36479c (5.15-rc6)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0330</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2042404">https://bugzilla.redhat.com/show_bug.cgi?id=2042404</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330</a><br><a href=https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c>https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0330.html>https://linux.oracle.com/cve/CVE-2022-0330.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5295-1>https://ubuntu.com/security/notices/USN-5295-1</a><br><a href=https://ubuntu.com/security/notices/USN-5295-2>https://ubuntu.com/security/notices/USN-5295-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/25/12>https://www.openwall.com/lists/oss-security/2022/01/25/12</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0382</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382</a><br><a href=https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523>https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0400</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2040604">https://bugzilla.redhat.com/show_bug.cgi?id=2040604</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)">https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044575">https://bugzilla.redhat.com/show_bug.cgi?id=2044575</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0435</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2048738">https://bugzilla.redhat.com/show_bug.cgi?id=2048738</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0435.html>https://linux.oracle.com/cve/CVE-2022-0435.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9245.html>https://linux.oracle.com/errata/ELSA-2022-9245.html</a><br><a href=https://ubuntu.com/security/notices/USN-5302-1>https://ubuntu.com/security/notices/USN-5302-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://ubuntu.com/security/notices/USN-5339-1>https://ubuntu.com/security/notices/USN-5339-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/02/10/1>https://www.openwall.com/lists/oss-security/2022/02/10/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0480</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2049700">https://bugzilla.redhat.com/show_bug.cgi?id=2049700</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480</a><br><a href="https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)">https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)</a><br><a href=https://github.com/kata-containers/kata-containers/issues/3373>https://github.com/kata-containers/kata-containers/issues/3373</a><br><a href=https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/ >https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0487</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044561">https://bugzilla.redhat.com/show_bug.cgi?id=2044561</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/ >https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/</a><br><a href=https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/ >https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/</a><br><a href=https://www.debian.org/security/2022/dsa-5095>https://www.debian.org/security/2022/dsa-5095</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0500</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044578">https://bugzilla.redhat.com/show_bug.cgi?id=2044578</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0516</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2050237">https://bugzilla.redhat.com/show_bug.cgi?id=2050237</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0516.html>https://linux.oracle.com/cve/CVE-2022-0516.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0825.html>https://linux.oracle.com/errata/ELSA-2022-0825.html</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5092>https://www.debian.org/security/2022/dsa-5092</a><br><a href=https://www.openwall.com/lists/oss-security/2022/02/11/2>https://www.openwall.com/lists/oss-security/2022/02/11/2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0850</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-84.94</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2060606">https://bugzilla.redhat.com/show_bug.cgi?id=2060606</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe</a><br><a href="https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8">https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-0998</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998</a><br><a href="https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)">https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)</a><br><a href=https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/ >https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-22942</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-100.113</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22942.html>https://linux.oracle.com/cve/CVE-2022-22942.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0825.html>https://linux.oracle.com/errata/ELSA-2022-0825.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-1>https://ubuntu.com/security/notices/USN-5294-1</a><br><a href=https://ubuntu.com/security/notices/USN-5294-2>https://ubuntu.com/security/notices/USN-5294-2</a><br><a href=https://ubuntu.com/security/notices/USN-5295-1>https://ubuntu.com/security/notices/USN-5295-1</a><br><a href=https://ubuntu.com/security/notices/USN-5295-2>https://ubuntu.com/security/notices/USN-5295-2</a><br><a href=https://ubuntu.com/security/notices/USN-5297-1>https://ubuntu.com/security/notices/USN-5297-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/27/4>https://www.openwall.com/lists/oss-security/2022/01/27/4</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23036</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23037</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23038</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23039</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23040</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23041</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-23042</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042</a><br><a href=https://xenbits.xen.org/xsa/advisory-396.html>https://xenbits.xen.org/xsa/advisory-396.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-396.txt>https://xenbits.xenproject.org/xsa/advisory-396.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-24958</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda</a><br><a href=https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74>https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74</a><br><a href=https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda>https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0008/ >https://security.netapp.com/advisory/ntap-20220225-0008/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-25258</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258</a><br><a href=https://github.com/szymonh/d-os-descriptor>https://github.com/szymonh/d-os-descriptor</a><br><a href=https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c>https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/</a><br><a href=https://www.debian.org/security/2022/dsa-5092>https://www.debian.org/security/2022/dsa-5092</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-25375</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/02/21/1>http://www.openwall.com/lists/oss-security/2022/02/21/1</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375</a><br><a href="https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)">https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)</a><br><a href=https://github.com/szymonh/rndis-co>https://github.com/szymonh/rndis-co</a><br><a href=https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826>https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://www.debian.org/security/2022/dsa-5092>https://www.debian.org/security/2022/dsa-5092</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-26490</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490</a><br><a href="https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)">https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)</a><br><a href=https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221>https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-26966</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966</a><br><a href="https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)">https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2022-27223</td> <td align=center>MEDIUM</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223</a><br><a href="https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)">https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)</a><br><a href=https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d>https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2017-0537</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/96831>http://www.securityfocus.com/bid/96831</a><br><a href=http://www.securitytracker.com/id/1037968>http://www.securitytracker.com/id/1037968</a><br><a href=https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0>https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537</a><br><a href=https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t>https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t</a><br><a href=https://source.android.com/security/bulletin/2017-01-01.html>https://source.android.com/security/bulletin/2017-01-01.html</a><br><a href=https://source.android.com/security/bulletin/2017-03-01>https://source.android.com/security/bulletin/2017-03-01</a><br><a href=https://source.android.com/security/bulletin/2017-03-01.html>https://source.android.com/security/bulletin/2017-03-01.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2017-13165</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165</a><br><a href=https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a>https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a</a><br><a href=https://source.android.com/security/bulletin/pixel/2017-12-01>https://source.android.com/security/bulletin/pixel/2017-12-01</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2017-13693</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/100502>http://www.securityfocus.com/bid/100502</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693</a><br><a href=https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732>https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732</a><br><a href=https://patchwork.kernel.org/patch/9919053/ >https://patchwork.kernel.org/patch/9919053/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2018-1121</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2018/q2/122>http://seclists.org/oss-sec/2018/q2/122</a><br><a href=http://www.securityfocus.com/bid/104214>http://www.securityfocus.com/bid/104214</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121</a><br><a href=https://www.exploit-db.com/exploits/44806/ >https://www.exploit-db.com/exploits/44806/</a><br><a href=https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt>https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2018-12928</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/104593>http://www.securityfocus.com/bid/104593</a><br><a href=https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384>https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928</a><br><a href=https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ>https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ</a><br><a href=https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/ >https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/</a><br><a href="https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2">https://marc.info/?l=linux-fsdevel&amp;m=152407263325766&amp;w=2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2018-12929</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/104588>http://www.securityfocus.com/bid/104588</a><br><a href=https://access.redhat.com/errata/RHSA-2019:0641>https://access.redhat.com/errata/RHSA-2019:0641</a><br><a href=https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403>https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929</a><br><a href="https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2">https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2018-12930</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/104588>http://www.securityfocus.com/bid/104588</a><br><a href=https://access.redhat.com/errata/RHSA-2019:0641>https://access.redhat.com/errata/RHSA-2019:0641</a><br><a href=https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403>https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930</a><br><a href="https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2">https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2018-12931</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/104588>http://www.securityfocus.com/bid/104588</a><br><a href=https://access.redhat.com/errata/RHSA-2019:0641>https://access.redhat.com/errata/RHSA-2019:0641</a><br><a href=https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403>https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931</a><br><a href="https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2">https://marc.info/?l=linux-ntfs-dev&amp;m=152413769810234&amp;w=2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2019-14899</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href=http://seclists.org/fulldisclosure/2020/Jul/23>http://seclists.org/fulldisclosure/2020/Jul/23</a><br><a href=http://seclists.org/fulldisclosure/2020/Jul/24>http://seclists.org/fulldisclosure/2020/Jul/24</a><br><a href=http://seclists.org/fulldisclosure/2020/Jul/25>http://seclists.org/fulldisclosure/2020/Jul/25</a><br><a href=http://seclists.org/fulldisclosure/2020/Nov/20>http://seclists.org/fulldisclosure/2020/Nov/20</a><br><a href=http://www.openwall.com/lists/oss-security/2020/08/13/2>http://www.openwall.com/lists/oss-security/2020/08/13/2</a><br><a href=http://www.openwall.com/lists/oss-security/2020/10/07/3>http://www.openwall.com/lists/oss-security/2020/10/07/3</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899</a><br><a href=https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/ >https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/</a><br><a href=https://support.apple.com/kb/HT211288>https://support.apple.com/kb/HT211288</a><br><a href=https://support.apple.com/kb/HT211289>https://support.apple.com/kb/HT211289</a><br><a href=https://support.apple.com/kb/HT211290>https://support.apple.com/kb/HT211290</a><br><a href=https://support.apple.com/kb/HT211850>https://support.apple.com/kb/HT211850</a><br><a href=https://support.apple.com/kb/HT211931>https://support.apple.com/kb/HT211931</a><br><a href=https://www.openwall.com/lists/oss-security/2019/12/05/1>https://www.openwall.com/lists/oss-security/2019/12/05/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2019-15213</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html>http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html</a><br><a href=http://www.openwall.com/lists/oss-security/2019/08/20/2>http://www.openwall.com/lists/oss-security/2019/08/20/2</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7</a><br><a href=https://linux.oracle.com/cve/CVE-2019-15213.html>https://linux.oracle.com/cve/CVE-2019-15213.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-4872.html>https://linux.oracle.com/errata/ELSA-2019-4872.html</a><br><a href=https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/ >https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/</a><br><a href=https://security.netapp.com/advisory/ntap-20190905-0002/ >https://security.netapp.com/advisory/ntap-20190905-0002/</a><br><a href="https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced">https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2019-16230</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.suse.com/show_bug.cgi?id=1150468">https://bugzilla.suse.com/show_bug.cgi?id=1150468</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230</a><br><a href=https://lkml.org/lkml/2019/9/9/487>https://lkml.org/lkml/2019/9/9/487</a><br><a href=https://security.netapp.com/advisory/ntap-20191004-0001/ >https://security.netapp.com/advisory/ntap-20191004-0001/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2019-19378</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378</a><br><a href=https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378>https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378</a><br><a href=https://security.netapp.com/advisory/ntap-20200103-0001/ >https://security.netapp.com/advisory/ntap-20200103-0001/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2019-19449</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449</a><br><a href=https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449>https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449</a><br><a href=https://security.netapp.com/advisory/ntap-20200103-0001/ >https://security.netapp.com/advisory/ntap-20200103-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5120-1>https://ubuntu.com/security/notices/USN-5120-1</a><br><a href=https://ubuntu.com/security/notices/USN-5136-1>https://ubuntu.com/security/notices/USN-5136-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2019-19814</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814</a><br><a href=https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814>https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814</a><br><a href=https://security.netapp.com/advisory/ntap-20200103-0001/ >https://security.netapp.com/advisory/ntap-20200103-0001/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-11725</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725</a><br><a href=https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474>https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474</a><br><a href=https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/ >https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/</a><br><a href=https://twitter.com/yabbadabbadrew/status/1248632267028582400>https://twitter.com/yabbadabbadrew/status/1248632267028582400</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-12363</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363</a><br><a href=https://linux.oracle.com/cve/CVE-2020-12363.html>https://linux.oracle.com/cve/CVE-2020-12363.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2314.html>https://linux.oracle.com/errata/ELSA-2021-2314.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-12364</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364</a><br><a href=https://linux.oracle.com/cve/CVE-2020-12364.html>https://linux.oracle.com/cve/CVE-2020-12364.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2314.html>https://linux.oracle.com/errata/ELSA-2021-2314.html</a><br><a href=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-14304</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14304.html>https://linux.oracle.com/cve/CVE-2020-14304.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9410.html>https://linux.oracle.com/errata/ELSA-2021-9410.html</a><br><a href=https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/ >https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-27820</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1901726">https://bugzilla.redhat.com/show_bug.cgi?id=1901726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820</a><br><a href=https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/ >https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/</a><br><a href=https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/ >https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/</a><br><a href=https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/ >https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/</a><br><a href=https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/ >https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2020-35501</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501</a><br><a href=https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html>https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html</a><br><a href=https://www.openwall.com/lists/oss-security/2021/02/18/1>https://www.openwall.com/lists/oss-security/2021/02/18/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-26934</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://xenbits.xen.org/xsa/advisory-363.html>http://xenbits.xen.org/xsa/advisory-363.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/</a><br><a href=https://security.netapp.com/advisory/ntap-20210326-0001/ >https://security.netapp.com/advisory/ntap-20210326-0001/</a><br><a href=https://www.openwall.com/lists/oss-security/2021/02/16/2>https://www.openwall.com/lists/oss-security/2021/02/16/2</a><br><a href=https://xenbits.xen.org/xsa/advisory-363.html>https://xenbits.xen.org/xsa/advisory-363.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-28711</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://xenbits.xen.org/xsa/advisory-391.html>https://xenbits.xen.org/xsa/advisory-391.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-391.txt>https://xenbits.xenproject.org/xsa/advisory-391.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-28712</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://xenbits.xen.org/xsa/advisory-391.html>https://xenbits.xen.org/xsa/advisory-391.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-391.txt>https://xenbits.xenproject.org/xsa/advisory-391.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-28713</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5278-1>https://ubuntu.com/security/notices/USN-5278-1</a><br><a href=https://ubuntu.com/security/notices/USN-5298-1>https://ubuntu.com/security/notices/USN-5298-1</a><br><a href=https://ubuntu.com/security/notices/USN-5337-1>https://ubuntu.com/security/notices/USN-5337-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://www.debian.org/security/2022/dsa-5050>https://www.debian.org/security/2022/dsa-5050</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://xenbits.xen.org/xsa/advisory-391.html>https://xenbits.xen.org/xsa/advisory-391.html</a><br><a href=https://xenbits.xenproject.org/xsa/advisory-391.txt>https://xenbits.xenproject.org/xsa/advisory-391.txt</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-32078</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)">https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)</a><br><a href=https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f>https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href=https://kirtikumarar.com/CVE-2021-32078.txt>https://kirtikumarar.com/CVE-2021-32078.txt</a><br><a href=https://security.netapp.com/advisory/ntap-20210813-0002/ >https://security.netapp.com/advisory/ntap-20210813-0002/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3428</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1972621">https://bugzilla.redhat.com/show_bug.cgi?id=1972621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3428.html>https://linux.oracle.com/cve/CVE-2021-3428.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9223.html>https://linux.oracle.com/errata/ELSA-2021-9223.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3428>https://ubuntu.com/security/CVE-2021-3428</a><br><a href=https://ubuntu.com/security/notices/USN-4979-1>https://ubuntu.com/security/notices/USN-4979-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://www.openwall.com/lists/oss-security/2021/03/17/1>https://www.openwall.com/lists/oss-security/2021/03/17/1</a><br><a href=https://www.openwall.com/lists/oss-security/2021/03/17/13>https://www.openwall.com/lists/oss-security/2021/03/17/13</a><br><a href=https://www.openwall.com/lists/oss-security/2021/03/17/5>https://www.openwall.com/lists/oss-security/2021/03/17/5</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-34693</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-81.91</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/06/15/1>http://www.openwall.com/lists/oss-security/2021/06/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693</a><br><a href=https://linux.oracle.com/cve/CVE-2021-34693.html>https://linux.oracle.com/cve/CVE-2021-34693.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9453.html>https://linux.oracle.com/errata/ELSA-2021-9453.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html</a><br><a href=https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/ >https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/</a><br><a href=https://ubuntu.com/security/notices/USN-5045-1>https://ubuntu.com/security/notices/USN-5045-1</a><br><a href=https://ubuntu.com/security/notices/USN-5070-1>https://ubuntu.com/security/notices/USN-5070-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-1>https://ubuntu.com/security/notices/USN-5073-1</a><br><a href=https://ubuntu.com/security/notices/USN-5073-2>https://ubuntu.com/security/notices/USN-5073-2</a><br><a href=https://ubuntu.com/security/notices/USN-5073-3>https://ubuntu.com/security/notices/USN-5073-3</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2021/dsa-4941>https://www.debian.org/security/2021/dsa-4941</a><br><a href=https://www.openwall.com/lists/oss-security/2021/06/15/1>https://www.openwall.com/lists/oss-security/2021/06/15/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-34981</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981</a><br><a href="https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)">https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479</a><br><a href=https://www.zerodayinitiative.com/advisories/ZDI-21-1223/ >https://www.zerodayinitiative.com/advisories/ZDI-21-1223/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3669</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669</a><br><a href=https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/ >https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3679</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1989165">https://bugzilla.redhat.com/show_bug.cgi?id=1989165</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679</a><br><a href=https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a>https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3679.html>https://linux.oracle.com/cve/CVE-2021-3679.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9488.html>https://linux.oracle.com/errata/ELSA-2021-9488.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/ >https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/</a><br><a href=https://ubuntu.com/security/notices/USN-5091-1>https://ubuntu.com/security/notices/USN-5091-1</a><br><a href=https://ubuntu.com/security/notices/USN-5091-2>https://ubuntu.com/security/notices/USN-5091-2</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5094-1>https://ubuntu.com/security/notices/USN-5094-1</a><br><a href=https://ubuntu.com/security/notices/USN-5094-2>https://ubuntu.com/security/notices/USN-5094-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2021/dsa-4978>https://www.debian.org/security/2021/dsa-4978</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-37159</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-91.102</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159</a><br><a href=https://linux.oracle.com/cve/CVE-2021-37159.html>https://linux.oracle.com/cve/CVE-2021-37159.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9475.html>https://linux.oracle.com/errata/ELSA-2021-9475.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/ >https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/</a><br><a href=https://security.netapp.com/advisory/ntap-20210819-0003/ >https://security.netapp.com/advisory/ntap-20210819-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5163-1>https://ubuntu.com/security/notices/USN-5163-1</a><br><a href=https://ubuntu.com/security/notices/USN-5164-1>https://ubuntu.com/security/notices/USN-5164-1</a><br><a href=https://www.spinics.net/lists/linux-usb/msg202228.html>https://www.spinics.net/lists/linux-usb/msg202228.html</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3739</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-90.101</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1997958">https://bugzilla.redhat.com/show_bug.cgi?id=1997958</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091</a><br><a href=https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091>https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3739.html>https://linux.oracle.com/cve/CVE-2021-3739.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9475.html>https://linux.oracle.com/errata/ELSA-2021-9475.html</a><br><a href=https://lore.kernel.org/linux-btrfs/20210806102415.304717-1-wqu@suse.com/T/#u>https://lore.kernel.org/linux-btrfs/20210806102415.304717-1-wqu@suse.com/T/#u</a><br><a href=https://ubuntu.com/security/CVE-2021-3739>https://ubuntu.com/security/CVE-2021-3739</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5117-1>https://ubuntu.com/security/notices/USN-5117-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-1>https://ubuntu.com/security/notices/USN-5137-1</a><br><a href=https://ubuntu.com/security/notices/USN-5137-2>https://ubuntu.com/security/notices/USN-5137-2</a><br><a href=https://www.openwall.com/lists/oss-security/2021/08/25/3>https://www.openwall.com/lists/oss-security/2021/08/25/3</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3744</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-91.102</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2000627">https://bugzilla.redhat.com/show_bug.cgi?id=2000627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744</a><br><a href=https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680>https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680</a><br><a href=https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0>https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3744.html>https://linux.oracle.com/cve/CVE-2021-3744.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9565.html>https://linux.oracle.com/errata/ELSA-2021-9565.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://seclists.org/oss-sec/2021/q3/164>https://seclists.org/oss-sec/2021/q3/164</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5140-1>https://ubuntu.com/security/notices/USN-5140-1</a><br><a href=https://ubuntu.com/security/notices/USN-5161-1>https://ubuntu.com/security/notices/USN-5161-1</a><br><a href=https://ubuntu.com/security/notices/USN-5162-1>https://ubuntu.com/security/notices/USN-5162-1</a><br><a href=https://ubuntu.com/security/notices/USN-5163-1>https://ubuntu.com/security/notices/USN-5163-1</a><br><a href=https://ubuntu.com/security/notices/USN-5164-1>https://ubuntu.com/security/notices/USN-5164-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-3772</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2000694">https://bugzilla.redhat.com/show_bug.cgi?id=2000694</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df</a><br><a href=https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df>https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3772>https://ubuntu.com/security/CVE-2021-3772</a><br><a href=https://ubuntu.com/security/notices/USN-5165-1>https://ubuntu.com/security/notices/USN-5165-1</a><br><a href=https://ubuntu.com/security/notices/USN-5265-1>https://ubuntu.com/security/notices/USN-5265-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38204</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-88.99</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b</a><br><a href=https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b>https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5091-1>https://ubuntu.com/security/notices/USN-5091-1</a><br><a href=https://ubuntu.com/security/notices/USN-5091-2>https://ubuntu.com/security/notices/USN-5091-2</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5094-1>https://ubuntu.com/security/notices/USN-5094-1</a><br><a href=https://ubuntu.com/security/notices/USN-5094-2>https://ubuntu.com/security/notices/USN-5094-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-38205</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-89.100</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205</a><br><a href=https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37>https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html>https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://ubuntu.com/security/notices/USN-5092-1>https://ubuntu.com/security/notices/USN-5092-1</a><br><a href=https://ubuntu.com/security/notices/USN-5092-2>https://ubuntu.com/security/notices/USN-5092-2</a><br><a href=https://ubuntu.com/security/notices/USN-5094-1>https://ubuntu.com/security/notices/USN-5094-1</a><br><a href=https://ubuntu.com/security/notices/USN-5094-2>https://ubuntu.com/security/notices/USN-5094-2</a><br><a href=https://ubuntu.com/security/notices/USN-5096-1>https://ubuntu.com/security/notices/USN-5096-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-1>https://ubuntu.com/security/notices/USN-5116-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-2>https://ubuntu.com/security/notices/USN-5116-2</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-41864</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a">https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a</a><br><a href=https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a>https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-41864.html>https://linux.oracle.com/cve/CVE-2021-41864.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9623.html>https://linux.oracle.com/errata/ELSA-2021-9623.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/</a><br><a href=https://security.netapp.com/advisory/ntap-20211029-0004/ >https://security.netapp.com/advisory/ntap-20211029-0004/</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5140-1>https://ubuntu.com/security/notices/USN-5140-1</a><br><a href=https://ubuntu.com/security/notices/USN-5208-1>https://ubuntu.com/security/notices/USN-5208-1</a><br><a href=https://ubuntu.com/security/notices/USN-5209-1>https://ubuntu.com/security/notices/USN-5209-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br><a href=https://ubuntu.com/security/notices/USN-5218-1>https://ubuntu.com/security/notices/USN-5218-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-42008</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-89.100</td> <td><details><summary>Expand...</summary><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008</a><br><a href="https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)">https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0002/ >https://security.netapp.com/advisory/ntap-20211104-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5113-1>https://ubuntu.com/security/notices/USN-5113-1</a><br><a href=https://ubuntu.com/security/notices/USN-5114-1>https://ubuntu.com/security/notices/USN-5114-1</a><br><a href=https://ubuntu.com/security/notices/USN-5115-1>https://ubuntu.com/security/notices/USN-5115-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-1>https://ubuntu.com/security/notices/USN-5116-1</a><br><a href=https://ubuntu.com/security/notices/USN-5116-2>https://ubuntu.com/security/notices/USN-5116-2</a><br><a href=https://ubuntu.com/security/notices/USN-5299-1>https://ubuntu.com/security/notices/USN-5299-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href="https://www.youtube.com/watch?v=d5f9xLK8Vhw">https://www.youtube.com/watch?v=d5f9xLK8Vhw</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-43389</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-92.103</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/11/05/1>http://www.openwall.com/lists/oss-security/2021/11/05/1</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013180">https://bugzilla.redhat.com/show_bug.cgi?id=2013180</a><br><a href=https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15>https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389</a><br><a href=https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d>https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href="https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/">https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/</a><br><a href=https://seclists.org/oss-sec/2021/q4/39>https://seclists.org/oss-sec/2021/q4/39</a><br><a href=https://ubuntu.com/security/notices/USN-5139-1>https://ubuntu.com/security/notices/USN-5139-1</a><br><a href=https://ubuntu.com/security/notices/USN-5165-1>https://ubuntu.com/security/notices/USN-5165-1</a><br><a href=https://ubuntu.com/security/notices/USN-5208-1>https://ubuntu.com/security/notices/USN-5208-1</a><br><a href=https://ubuntu.com/security/notices/USN-5209-1>https://ubuntu.com/security/notices/USN-5209-1</a><br><a href=https://ubuntu.com/security/notices/USN-5210-1>https://ubuntu.com/security/notices/USN-5210-1</a><br><a href=https://ubuntu.com/security/notices/USN-5218-1>https://ubuntu.com/security/notices/USN-5218-1</a><br><a href=https://ubuntu.com/security/notices/USN-5343-1>https://ubuntu.com/security/notices/USN-5343-1</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br><a href=https://www.openwall.com/lists/oss-security/2021/10/19/1>https://www.openwall.com/lists/oss-security/2021/10/19/1</a><br></details></td> </tr> <tr> <td align=left>linux-libc-dev</td> <td align=center>CVE-2021-43976</td> <td align=center>LOW</td> <td align=center>5.4.0-77.86</td> <td align=center>5.4.0-105.119</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84">https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/</a><br><a href=https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/ >https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/</a><br><a href=https://security.netapp.com/advisory/ntap-20211210-0001/ >https://security.netapp.com/advisory/ntap-20211210-0001/</a><br><a href=https://ubuntu.com/security/notices/USN-5302-1>https://ubuntu.com/security/notices/USN-5302-1</a><br><a href=https://ubuntu.com/security/notices/USN-5338-1>https://ubuntu.com/security/notices/USN-5338-1</a><br><a href=https://ubuntu.com/security/notices/USN-5339-1>https://ubuntu.com/security/notices/USN-5339-1</a><br><a href=https://www.debian.org/security/2022/dsa-5092>https://www.debian.org/security/2022/dsa-5092</a><br><a href=https://www.debian.org/security/2022/dsa-5096>https://www.debian.org/security/2022/dsa-5096</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2021-3999</td> <td align=center>MEDIUM</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3999.html>https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/4>https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2016-10228</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://openwall.com/lists/oss-security/2017/03/01/10>http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href=http://www.securityfocus.com/bid/96525>http://www.securityfocus.com/bid/96525</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href=https://linux.oracle.com/cve/CVE-2016-10228.html>https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2019-25013</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href=https://linux.oracle.com/cve/CVE-2019-25013.html>https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E>https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.netapp.com/advisory/ntap-20210205-0004/ >https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2020-27618</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href=https://linux.oracle.com/cve/CVE-2020-27618.html>https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210401-0006/ >https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2020-29562</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href=https://security.netapp.com/advisory/ntap-20210122-0004/ >https://security.netapp.com/advisory/ntap-20210122-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26923">https://sourceware.org/bugzilla/show_bug.cgi?id=26923</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html>https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2020-6096</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href=https://security.gentoo.org/glsa/202101-20>https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href=https://ubuntu.com/security/notices/USN-4954-1>https://ubuntu.com/security/notices/USN-4954-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019>https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2021-27645</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href=https://linux.oracle.com/cve/CVE-2021-27645.html>https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2021-3326</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/01/28/2>http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3326.html>https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9344.html>https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href=https://security.gentoo.org/glsa/202107-07>https://security.gentoo.org/glsa/202107-07</a><br><a href=https://security.netapp.com/advisory/ntap-20210304-0007/ >https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href=https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html>https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2021-35942</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href=https://linux.oracle.com/cve/CVE-2021-35942.html>https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9560.html>https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0005/ >https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href=https://sourceware.org/glibc/wiki/Security%20Exceptions>https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2022-23218</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23218.html>https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>locales</td> <td align=center>CVE-2022-23219</td> <td align=center>LOW</td> <td align=center>2.31-0ubuntu9.2</td> <td align=center>2.31-0ubuntu9.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href=https://linux.oracle.com/cve/CVE-2022-23219.html>https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9234.html>https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href=https://ubuntu.com/security/notices/USN-5310-1>https://ubuntu.com/security/notices/USN-5310-1</a><br><a href=https://ubuntu.com/security/notices/USN-5310-2>https://ubuntu.com/security/notices/USN-5310-2</a><br></details></td> </tr> <tr> <td align=left>login</td> <td align=center>CVE-2013-4235</td> <td align=center>LOW</td> <td align=center>1:4.8.1-1ubuntu5.20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/cve-2013-4235>https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2013-4235>https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details></td> </tr> <tr> <td align=left>mount</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>mount</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>openssh-client</td> <td align=center>CVE-2021-36368</td> <td align=center>MEDIUM</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.mindrot.org/show_bug.cgi?id=3316">https://bugzilla.mindrot.org/show_bug.cgi?id=3316</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368</a><br><a href=https://docs.ssh-mitm.at/trivialauth.html>https://docs.ssh-mitm.at/trivialauth.html</a><br><a href=https://github.com/openssh/openssh-portable/pull/258>https://github.com/openssh/openssh-portable/pull/258</a><br><a href=https://www.openssh.com/security.html>https://www.openssh.com/security.html</a><br></details></td> </tr> <tr> <td align=left>openssh-client</td> <td align=center>CVE-2020-14145</td> <td align=center>LOW</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2020/12/02/1>http://www.openwall.com/lists/oss-security/2020/12/02/1</a><br><a href="https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d">https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145</a><br><a href=https://docs.ssh-mitm.at/CVE-2020-14145.html>https://docs.ssh-mitm.at/CVE-2020-14145.html</a><br><a href=https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1>https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1</a><br><a href=https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py>https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14145.html>https://linux.oracle.com/cve/CVE-2020-14145.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4368.html>https://linux.oracle.com/errata/ELSA-2021-4368.html</a><br><a href=https://security.gentoo.org/glsa/202105-35>https://security.gentoo.org/glsa/202105-35</a><br><a href=https://security.netapp.com/advisory/ntap-20200709-0004/ >https://security.netapp.com/advisory/ntap-20200709-0004/</a><br><a href=https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ >https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/</a><br><a href=https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf>https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf</a><br></details></td> </tr> <tr> <td align=left>openssh-client</td> <td align=center>CVE-2021-41617</td> <td align=center>LOW</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.suse.com/show_bug.cgi?id=1190975">https://bugzilla.suse.com/show_bug.cgi?id=1190975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617</a><br><a href=https://linux.oracle.com/cve/CVE-2021-41617.html>https://linux.oracle.com/cve/CVE-2021-41617.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9575.html>https://linux.oracle.com/errata/ELSA-2021-9575.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/</a><br><a href=https://security.netapp.com/advisory/ntap-20211014-0004/ >https://security.netapp.com/advisory/ntap-20211014-0004/</a><br><a href=https://www.openssh.com/security.html>https://www.openssh.com/security.html</a><br><a href=https://www.openssh.com/txt/release-8.8>https://www.openssh.com/txt/release-8.8</a><br><a href=https://www.openwall.com/lists/oss-security/2021/09/26/1>https://www.openwall.com/lists/oss-security/2021/09/26/1</a><br></details></td> </tr> <tr> <td align=left>openssh-server</td> <td align=center>CVE-2021-36368</td> <td align=center>MEDIUM</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.mindrot.org/show_bug.cgi?id=3316">https://bugzilla.mindrot.org/show_bug.cgi?id=3316</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368</a><br><a href=https://docs.ssh-mitm.at/trivialauth.html>https://docs.ssh-mitm.at/trivialauth.html</a><br><a href=https://github.com/openssh/openssh-portable/pull/258>https://github.com/openssh/openssh-portable/pull/258</a><br><a href=https://www.openssh.com/security.html>https://www.openssh.com/security.html</a><br></details></td> </tr> <tr> <td align=left>openssh-server</td> <td align=center>CVE-2020-14145</td> <td align=center>LOW</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2020/12/02/1>http://www.openwall.com/lists/oss-security/2020/12/02/1</a><br><a href="https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d">https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145</a><br><a href=https://docs.ssh-mitm.at/CVE-2020-14145.html>https://docs.ssh-mitm.at/CVE-2020-14145.html</a><br><a href=https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1>https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1</a><br><a href=https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py>https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14145.html>https://linux.oracle.com/cve/CVE-2020-14145.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4368.html>https://linux.oracle.com/errata/ELSA-2021-4368.html</a><br><a href=https://security.gentoo.org/glsa/202105-35>https://security.gentoo.org/glsa/202105-35</a><br><a href=https://security.netapp.com/advisory/ntap-20200709-0004/ >https://security.netapp.com/advisory/ntap-20200709-0004/</a><br><a href=https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ >https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/</a><br><a href=https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf>https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf</a><br></details></td> </tr> <tr> <td align=left>openssh-server</td> <td align=center>CVE-2021-41617</td> <td align=center>LOW</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.suse.com/show_bug.cgi?id=1190975">https://bugzilla.suse.com/show_bug.cgi?id=1190975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617</a><br><a href=https://linux.oracle.com/cve/CVE-2021-41617.html>https://linux.oracle.com/cve/CVE-2021-41617.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9575.html>https://linux.oracle.com/errata/ELSA-2021-9575.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/</a><br><a href=https://security.netapp.com/advisory/ntap-20211014-0004/ >https://security.netapp.com/advisory/ntap-20211014-0004/</a><br><a href=https://www.openssh.com/security.html>https://www.openssh.com/security.html</a><br><a href=https://www.openssh.com/txt/release-8.8>https://www.openssh.com/txt/release-8.8</a><br><a href=https://www.openwall.com/lists/oss-security/2021/09/26/1>https://www.openwall.com/lists/oss-security/2021/09/26/1</a><br></details></td> </tr> <tr> <td align=left>openssh-sftp-server</td> <td align=center>CVE-2021-36368</td> <td align=center>MEDIUM</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.mindrot.org/show_bug.cgi?id=3316">https://bugzilla.mindrot.org/show_bug.cgi?id=3316</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368</a><br><a href=https://docs.ssh-mitm.at/trivialauth.html>https://docs.ssh-mitm.at/trivialauth.html</a><br><a href=https://github.com/openssh/openssh-portable/pull/258>https://github.com/openssh/openssh-portable/pull/258</a><br><a href=https://www.openssh.com/security.html>https://www.openssh.com/security.html</a><br></details></td> </tr> <tr> <td align=left>openssh-sftp-server</td> <td align=center>CVE-2020-14145</td> <td align=center>LOW</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2020/12/02/1>http://www.openwall.com/lists/oss-security/2020/12/02/1</a><br><a href="https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d">https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145</a><br><a href=https://docs.ssh-mitm.at/CVE-2020-14145.html>https://docs.ssh-mitm.at/CVE-2020-14145.html</a><br><a href=https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1>https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1</a><br><a href=https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py>https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14145.html>https://linux.oracle.com/cve/CVE-2020-14145.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4368.html>https://linux.oracle.com/errata/ELSA-2021-4368.html</a><br><a href=https://security.gentoo.org/glsa/202105-35>https://security.gentoo.org/glsa/202105-35</a><br><a href=https://security.netapp.com/advisory/ntap-20200709-0004/ >https://security.netapp.com/advisory/ntap-20200709-0004/</a><br><a href=https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ >https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/</a><br><a href=https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf>https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf</a><br></details></td> </tr> <tr> <td align=left>openssh-sftp-server</td> <td align=center>CVE-2021-41617</td> <td align=center>LOW</td> <td align=center>1:8.2p1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.suse.com/show_bug.cgi?id=1190975">https://bugzilla.suse.com/show_bug.cgi?id=1190975</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617</a><br><a href=https://linux.oracle.com/cve/CVE-2021-41617.html>https://linux.oracle.com/cve/CVE-2021-41617.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-9575.html>https://linux.oracle.com/errata/ELSA-2021-9575.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/</a><br><a href=https://security.netapp.com/advisory/ntap-20211014-0004/ >https://security.netapp.com/advisory/ntap-20211014-0004/</a><br><a href=https://www.openssh.com/security.html>https://www.openssh.com/security.html</a><br><a href=https://www.openssh.com/txt/release-8.8>https://www.openssh.com/txt/release-8.8</a><br><a href=https://www.openwall.com/lists/oss-security/2021/09/26/1>https://www.openwall.com/lists/oss-security/2021/09/26/1</a><br></details></td> </tr> <tr> <td align=left>openssl</td> <td align=center>CVE-2021-3711</td> <td align=center>HIGH</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.8</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/26/2>http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46</a><br><a href=https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0010/ >https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5051-1>https://ubuntu.com/security/notices/USN-5051-1</a><br><a href=https://www.debian.org/security/2021/dsa-4963>https://www.debian.org/security/2021/dsa-4963</a><br><a href=https://www.openssl.org/news/secadv/20210824.txt>https://www.openssl.org/news/secadv/20210824.txt</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-16>https://www.tenable.com/security/tns-2021-16</a><br><a href=https://www.tenable.com/security/tns-2022-02>https://www.tenable.com/security/tns-2022-02</a><br></details></td> </tr> <tr> <td align=left>openssl</td> <td align=center>CVE-2022-0778</td> <td align=center>HIGH</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.12</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0778.html>https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9246.html>https://linux.oracle.com/errata/ELSA-2022-9246.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href=https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002>https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href=https://security.netapp.com/advisory/ntap-20220321-0002/ >https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href=https://ubuntu.com/security/notices/USN-5328-1>https://ubuntu.com/security/notices/USN-5328-1</a><br><a href=https://ubuntu.com/security/notices/USN-5328-2>https://ubuntu.com/security/notices/USN-5328-2</a><br><a href=https://www.debian.org/security/2022/dsa-5103>https://www.debian.org/security/2022/dsa-5103</a><br><a href=https://www.openssl.org/news/secadv/20220315.txt>https://www.openssl.org/news/secadv/20220315.txt</a><br></details></td> </tr> <tr> <td align=left>openssl</td> <td align=center>CVE-2021-3712</td> <td align=center>MEDIUM</td> <td align=center>1.1.1f-1ubuntu2.4</td> <td align=center>1.1.1f-1ubuntu2.8</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/26/2>http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3712.html>https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9023.html>https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href=https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E>https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html>https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210827-0010/ >https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href=https://ubuntu.com/security/notices/USN-5051-1>https://ubuntu.com/security/notices/USN-5051-1</a><br><a href=https://ubuntu.com/security/notices/USN-5051-2>https://ubuntu.com/security/notices/USN-5051-2</a><br><a href=https://ubuntu.com/security/notices/USN-5051-3>https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href=https://ubuntu.com/security/notices/USN-5088-1>https://ubuntu.com/security/notices/USN-5088-1</a><br><a href=https://www.debian.org/security/2021/dsa-4963>https://www.debian.org/security/2021/dsa-4963</a><br><a href=https://www.openssl.org/news/secadv/20210824.txt>https://www.openssl.org/news/secadv/20210824.txt</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href=https://www.tenable.com/security/tns-2021-16>https://www.tenable.com/security/tns-2021-16</a><br><a href=https://www.tenable.com/security/tns-2022-02>https://www.tenable.com/security/tns-2022-02</a><br></details></td> </tr> <tr> <td align=left>passwd</td> <td align=center>CVE-2013-4235</td> <td align=center>LOW</td> <td align=center>1:4.8.1-1ubuntu5.20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/cve-2013-4235>https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2013-4235>https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details></td> </tr> <tr> <td align=left>patch</td> <td align=center>CVE-2018-6952</td> <td align=center>LOW</td> <td align=center>2.7.6-6</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/103047>http://www.securityfocus.com/bid/103047</a><br><a href=https://access.redhat.com/errata/RHSA-2019:2033>https://access.redhat.com/errata/RHSA-2019:2033</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952</a><br><a href=https://linux.oracle.com/cve/CVE-2018-6952.html>https://linux.oracle.com/cve/CVE-2018-6952.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2019-2033.html>https://linux.oracle.com/errata/ELSA-2019-2033.html</a><br><a href=https://savannah.gnu.org/bugs/index.php?53133>https://savannah.gnu.org/bugs/index.php?53133</a><br><a href=https://security.gentoo.org/glsa/201904-17>https://security.gentoo.org/glsa/201904-17</a><br></details></td> </tr> <tr> <td align=left>patch</td> <td align=center>CVE-2021-45261</td> <td align=center>LOW</td> <td align=center>2.7.6-6</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261</a><br><a href=https://savannah.gnu.org/bugs/?61685>https://savannah.gnu.org/bugs/?61685</a><br></details></td> </tr> <tr> <td align=left>perl</td> <td align=center>CVE-2020-16156</td> <td align=center>MEDIUM</td> <td align=center>5.30.0-9ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html>http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href=https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ >https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href=https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c>https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href=https://metacpan.org/pod/distribution/CPAN/scripts/cpan>https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details></td> </tr> <tr> <td align=left>perl-base</td> <td align=center>CVE-2020-16156</td> <td align=center>MEDIUM</td> <td align=center>5.30.0-9ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html>http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href=https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ >https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href=https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c>https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href=https://metacpan.org/pod/distribution/CPAN/scripts/cpan>https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details></td> </tr> <tr> <td align=left>perl-modules-5.30</td> <td align=center>CVE-2020-16156</td> <td align=center>MEDIUM</td> <td align=center>5.30.0-9ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html>http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href=https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ >https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href=https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c>https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href=https://metacpan.org/pod/distribution/CPAN/scripts/cpan>https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details></td> </tr> <tr> <td align=left>policykit-1</td> <td align=center>CVE-2021-4034</td> <td align=center>HIGH</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center>0.105-26ubuntu1.2</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html>http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html</a><br><a href=http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html>http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html</a><br><a href=https://access.redhat.com/security/vulnerabilities/RHSB-2022-001>https://access.redhat.com/security/vulnerabilities/RHSB-2022-001</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869">https://bugzilla.redhat.com/show_bug.cgi?id=2025869</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034</a><br><a href=https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683>https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4034.html>https://linux.oracle.com/cve/CVE-2021-4034.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-9073.html>https://linux.oracle.com/errata/ELSA-2022-9073.html</a><br><a href=https://ubuntu.com/security/notices/USN-5252-1>https://ubuntu.com/security/notices/USN-5252-1</a><br><a href=https://ubuntu.com/security/notices/USN-5252-2>https://ubuntu.com/security/notices/USN-5252-2</a><br><a href=https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt>https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</a><br></details></td> </tr> <tr> <td align=left>policykit-1</td> <td align=center>CVE-2021-4115</td> <td align=center>MEDIUM</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center>0.105-26ubuntu1.3</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/cve-2021-4115>https://access.redhat.com/security/cve/cve-2021-4115</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115</a><br><a href="https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e">https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e</a><br><a href=https://gitlab.freedesktop.org/polkit/polkit/-/issues/141>https://gitlab.freedesktop.org/polkit/polkit/-/issues/141</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/</a><br><a href=https://securitylab.github.com/advisories/GHSL-2021-077-polkit/ >https://securitylab.github.com/advisories/GHSL-2021-077-polkit/</a><br><a href=https://ubuntu.com/security/notices/USN-5304-1>https://ubuntu.com/security/notices/USN-5304-1</a><br></details></td> </tr> <tr> <td align=left>policykit-1</td> <td align=center>CVE-2016-2568</td> <td align=center>LOW</td> <td align=center>0.105-26ubuntu1.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/oss-sec/2016/q1/443>http://seclists.org/oss-sec/2016/q1/443</a><br><a href=http://www.openwall.com/lists/oss-security/2016/02/26/3>http://www.openwall.com/lists/oss-security/2016/02/26/3</a><br><a href=https://access.redhat.com/security/cve/cve-2016-2568>https://access.redhat.com/security/cve/cve-2016-2568</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1300746">https://bugzilla.redhat.com/show_bug.cgi?id=1300746</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568</a><br><a href=https://lore.kernel.org/patchwork/patch/793178/ >https://lore.kernel.org/patchwork/patch/793178/</a><br><a href=https://ubuntu.com/security/CVE-2016-2568>https://ubuntu.com/security/CVE-2016-2568</a><br></details></td> </tr> <tr> <td align=left>python3-urllib3</td> <td align=center>CVE-2021-33503</td> <td align=center>LOW</td> <td align=center>1.25.8-2ubuntu0.1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503</a><br><a href=https://github.com/advisories/GHSA-q2q7-5pp4-w6pg>https://github.com/advisories/GHSA-q2q7-5pp4-w6pg</a><br><a href=https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec>https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec</a><br><a href=https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg>https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33503.html>https://linux.oracle.com/cve/CVE-2021-33503.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4162.html>https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-33503>https://nvd.nist.gov/vuln/detail/CVE-2021-33503</a><br><a href=https://security.gentoo.org/glsa/202107-36>https://security.gentoo.org/glsa/202107-36</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>python3.8</td> <td align=center>CVE-2021-29921</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.1</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue36384>https://bugs.python.org/issue36384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921</a><br><a href=https://docs.python.org/3/library/ipaddress.html>https://docs.python.org/3/library/ipaddress.html</a><br><a href=https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst>https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst</a><br><a href=https://github.com/python/cpython/pull/12577>https://github.com/python/cpython/pull/12577</a><br><a href=https://github.com/python/cpython/pull/25099>https://github.com/python/cpython/pull/25099</a><br><a href=https://github.com/sickcodes>https://github.com/sickcodes</a><br><a href=https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md>https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md</a><br><a href=https://linux.oracle.com/cve/CVE-2021-29921.html>https://linux.oracle.com/cve/CVE-2021-29921.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4162.html>https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href=https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html>https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210622-0003/ >https://security.netapp.com/advisory/ntap-20210622-0003/</a><br><a href=https://sick.codes/sick-2021-014>https://sick.codes/sick-2021-014</a><br><a href=https://ubuntu.com/security/notices/USN-4973-1>https://ubuntu.com/security/notices/USN-4973-1</a><br><a href=https://ubuntu.com/security/notices/USN-4973-2>https://ubuntu.com/security/notices/USN-4973-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>python3.8</td> <td align=center>CVE-2021-3737</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.2</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue44022>https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href=https://github.com/python/cpython/pull/25916>https://github.com/python/cpython/pull/25916</a><br><a href=https://github.com/python/cpython/pull/26503>https://github.com/python/cpython/pull/26503</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3737.html>https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4160.html>https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href=https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html>https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3737>https://ubuntu.com/security/CVE-2021-3737</a><br><a href=https://ubuntu.com/security/notices/USN-5083-1>https://ubuntu.com/security/notices/USN-5083-1</a><br><a href=https://ubuntu.com/security/notices/USN-5199-1>https://ubuntu.com/security/notices/USN-5199-1</a><br><a href=https://ubuntu.com/security/notices/USN-5200-1>https://ubuntu.com/security/notices/USN-5200-1</a><br><a href=https://ubuntu.com/security/notices/USN-5201-1>https://ubuntu.com/security/notices/USN-5201-1</a><br></details></td> </tr> <tr> <td align=left>python3.8</td> <td align=center>CVE-2022-0391</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue43882>https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0009/ >https://security.netapp.com/advisory/ntap-20220225-0009/</a><br></details></td> </tr> <tr> <td align=left>python3.8-minimal</td> <td align=center>CVE-2021-29921</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.1</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue36384>https://bugs.python.org/issue36384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921</a><br><a href=https://docs.python.org/3/library/ipaddress.html>https://docs.python.org/3/library/ipaddress.html</a><br><a href=https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst>https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst</a><br><a href=https://github.com/python/cpython/pull/12577>https://github.com/python/cpython/pull/12577</a><br><a href=https://github.com/python/cpython/pull/25099>https://github.com/python/cpython/pull/25099</a><br><a href=https://github.com/sickcodes>https://github.com/sickcodes</a><br><a href=https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md>https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md</a><br><a href=https://linux.oracle.com/cve/CVE-2021-29921.html>https://linux.oracle.com/cve/CVE-2021-29921.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4162.html>https://linux.oracle.com/errata/ELSA-2021-4162.html</a><br><a href=https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html>https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html</a><br><a href=https://security.netapp.com/advisory/ntap-20210622-0003/ >https://security.netapp.com/advisory/ntap-20210622-0003/</a><br><a href=https://sick.codes/sick-2021-014>https://sick.codes/sick-2021-014</a><br><a href=https://ubuntu.com/security/notices/USN-4973-1>https://ubuntu.com/security/notices/USN-4973-1</a><br><a href=https://ubuntu.com/security/notices/USN-4973-2>https://ubuntu.com/security/notices/USN-4973-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>python3.8-minimal</td> <td align=center>CVE-2021-3737</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center>3.8.10-0ubuntu1~20.04.2</td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue44022>https://bugs.python.org/issue44022</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162">https://bugzilla.redhat.com/show_bug.cgi?id=1995162</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737</a><br><a href="https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)">https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)</a><br><a href="https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)">https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)</a><br><a href="https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14">https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14</a><br><a href="https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)">https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)">https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)</a><br><a href="https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)">https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)</a><br><a href="https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)">https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)</a><br><a href="https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)">https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)</a><br><a href="https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)">https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)</a><br><a href="https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)">https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)</a><br><a href=https://github.com/python/cpython/pull/25916>https://github.com/python/cpython/pull/25916</a><br><a href=https://github.com/python/cpython/pull/26503>https://github.com/python/cpython/pull/26503</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3737.html>https://linux.oracle.com/cve/CVE-2021-3737.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4160.html>https://linux.oracle.com/errata/ELSA-2021-4160.html</a><br><a href=https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html>https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html</a><br><a href=https://ubuntu.com/security/CVE-2021-3737>https://ubuntu.com/security/CVE-2021-3737</a><br><a href=https://ubuntu.com/security/notices/USN-5083-1>https://ubuntu.com/security/notices/USN-5083-1</a><br><a href=https://ubuntu.com/security/notices/USN-5199-1>https://ubuntu.com/security/notices/USN-5199-1</a><br><a href=https://ubuntu.com/security/notices/USN-5200-1>https://ubuntu.com/security/notices/USN-5200-1</a><br><a href=https://ubuntu.com/security/notices/USN-5201-1>https://ubuntu.com/security/notices/USN-5201-1</a><br></details></td> </tr> <tr> <td align=left>python3.8-minimal</td> <td align=center>CVE-2022-0391</td> <td align=center>MEDIUM</td> <td align=center>3.8.10-0ubuntu1~20.04</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://bugs.python.org/issue43882>https://bugs.python.org/issue43882</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/</a><br><a href=https://security.netapp.com/advisory/ntap-20220225-0009/ >https://security.netapp.com/advisory/ntap-20220225-0009/</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2021-44142</td> <td align=center>HIGH</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.samba.org/show_bug.cgi?id=14914">https://bugzilla.samba.org/show_bug.cgi?id=14914</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142</a><br><a href=https://kb.cert.org/vuls/id/119678>https://kb.cert.org/vuls/id/119678</a><br><a href=https://linux.oracle.com/cve/CVE-2021-44142.html>https://linux.oracle.com/cve/CVE-2021-44142.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0332.html>https://linux.oracle.com/errata/ELSA-2022-0332.html</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://ubuntu.com/security/notices/USN-5260-2>https://ubuntu.com/security/notices/USN-5260-2</a><br><a href=https://ubuntu.com/security/notices/USN-5260-3>https://ubuntu.com/security/notices/USN-5260-3</a><br><a href=https://www.samba.org/samba/security/CVE-2021-44142.html>https://www.samba.org/samba/security/CVE-2021-44142.html</a><br><a href=https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin>https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2016-2124</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019660">https://bugzilla.redhat.com/show_bug.cgi?id=2019660</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124</a><br><a href=https://linux.oracle.com/cve/CVE-2016-2124.html>https://linux.oracle.com/cve/CVE-2016-2124.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5192.html>https://linux.oracle.com/errata/ELSA-2021-5192.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2016-2124.html>https://www.samba.org/samba/security/CVE-2016-2124.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2020-25717</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019672">https://bugzilla.redhat.com/show_bug.cgi?id=2019672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25717.html>https://linux.oracle.com/cve/CVE-2020-25717.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5192.html>https://linux.oracle.com/errata/ELSA-2021-5192.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25717.html>https://www.samba.org/samba/security/CVE-2020-25717.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2020-25718</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019726">https://bugzilla.redhat.com/show_bug.cgi?id=2019726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25718.html>https://www.samba.org/samba/security/CVE-2020-25718.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2020-25719</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019732">https://bugzilla.redhat.com/show_bug.cgi?id=2019732</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719</a><br><a href=https://linux.oracle.com/cve/CVE-2020-25719.html>https://linux.oracle.com/cve/CVE-2020-25719.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5195.html>https://linux.oracle.com/errata/ELSA-2021-5195.html</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25719.html>https://www.samba.org/samba/security/CVE-2020-25719.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2020-25721</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2021728">https://bugzilla.redhat.com/show_bug.cgi?id=2021728</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14725">https://bugzilla.samba.org/show_bug.cgi?id=14725</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25721.html>https://www.samba.org/samba/security/CVE-2020-25721.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2020-25722</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019764">https://bugzilla.redhat.com/show_bug.cgi?id=2019764</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2020-25722.html>https://www.samba.org/samba/security/CVE-2020-25722.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2021-23192</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2019666">https://bugzilla.redhat.com/show_bug.cgi?id=2019666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192</a><br><a href=https://linux.oracle.com/cve/CVE-2021-23192.html>https://linux.oracle.com/cve/CVE-2021-23192.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-5082.html>https://linux.oracle.com/errata/ELSA-2021-5082.html</a><br><a href=https://ubuntu.com/security/CVE-2021-23192>https://ubuntu.com/security/CVE-2021-23192</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2021-23192.html>https://www.samba.org/samba/security/CVE-2021-23192.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2021-3738</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2021726">https://bugzilla.redhat.com/show_bug.cgi?id=2021726</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14468">https://bugzilla.samba.org/show_bug.cgi?id=14468</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://www.samba.org/samba/history/samba-4.13.14.html>https://www.samba.org/samba/history/samba-4.13.14.html</a><br><a href=https://www.samba.org/samba/security/CVE-2021-3738.html>https://www.samba.org/samba/security/CVE-2021-3738.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2022-0336</td> <td align=center>MEDIUM</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://www.samba.org/samba/security/CVE-2022-0336.html>https://www.samba.org/samba/security/CVE-2022-0336.html</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2021-3671</td> <td align=center>LOW</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.14+dfsg-0ubuntu0.20.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href=https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a>https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href=https://ubuntu.com/security/notices/USN-5142-1>https://ubuntu.com/security/notices/USN-5142-1</a><br><a href=https://ubuntu.com/security/notices/USN-5174-1>https://ubuntu.com/security/notices/USN-5174-1</a><br></details></td> </tr> <tr> <td align=left>samba-libs</td> <td align=center>CVE-2021-43566</td> <td align=center>LOW</td> <td align=center>2:4.11.6+dfsg-0ubuntu1.9</td> <td align=center>2:4.13.17~dfsg-0ubuntu0.21.04.1</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.samba.org/show_bug.cgi?id=13979">https://bugzilla.samba.org/show_bug.cgi?id=13979</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566</a><br><a href=https://ubuntu.com/security/notices/USN-5260-1>https://ubuntu.com/security/notices/USN-5260-1</a><br><a href=https://www.samba.org/samba/history/ >https://www.samba.org/samba/history/</a><br><a href=https://www.samba.org/samba/security/CVE-2021-43566.html>https://www.samba.org/samba/security/CVE-2021-43566.html</a><br></details></td> </tr> <tr> <td align=left>sqlite3</td> <td align=center>CVE-2020-9794</td> <td align=center>MEDIUM</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/HT211168>https://support.apple.com/HT211168</a><br><a href=https://support.apple.com/HT211170>https://support.apple.com/HT211170</a><br><a href=https://support.apple.com/HT211171>https://support.apple.com/HT211171</a><br><a href=https://support.apple.com/HT211175>https://support.apple.com/HT211175</a><br><a href=https://support.apple.com/HT211178>https://support.apple.com/HT211178</a><br><a href=https://support.apple.com/HT211179>https://support.apple.com/HT211179</a><br><a href=https://support.apple.com/HT211181>https://support.apple.com/HT211181</a><br><a href=https://vuldb.com/?id.155768>https://vuldb.com/?id.155768</a><br></details></td> </tr> <tr> <td align=left>sqlite3</td> <td align=center>CVE-2020-9849</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT211843>https://support.apple.com/en-us/HT211843</a><br><a href=https://support.apple.com/en-us/HT211844>https://support.apple.com/en-us/HT211844</a><br><a href=https://support.apple.com/en-us/HT211850>https://support.apple.com/en-us/HT211850</a><br><a href=https://support.apple.com/en-us/HT211931>https://support.apple.com/en-us/HT211931</a><br><a href=https://support.apple.com/en-us/HT211935>https://support.apple.com/en-us/HT211935</a><br><a href=https://support.apple.com/en-us/HT211952>https://support.apple.com/en-us/HT211952</a><br><a href=https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/ >https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details></td> </tr> <tr> <td align=left>sqlite3</td> <td align=center>CVE-2020-9991</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2020/Dec/32>http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://support.apple.com/en-us/HT211843>https://support.apple.com/en-us/HT211843</a><br><a href=https://support.apple.com/en-us/HT211844>https://support.apple.com/en-us/HT211844</a><br><a href=https://support.apple.com/en-us/HT211847>https://support.apple.com/en-us/HT211847</a><br><a href=https://support.apple.com/en-us/HT211850>https://support.apple.com/en-us/HT211850</a><br><a href=https://support.apple.com/en-us/HT211931>https://support.apple.com/en-us/HT211931</a><br><a href=https://support.apple.com/kb/HT211846>https://support.apple.com/kb/HT211846</a><br><a href=https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/ >https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details></td> </tr> <tr> <td align=left>sqlite3</td> <td align=center>CVE-2021-36690</td> <td align=center>LOW</td> <td align=center>3.31.1-4ubuntu0.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.sqlite.org/forum/forumpost/718c0a8d17>https://www.sqlite.org/forum/forumpost/718c0a8d17</a><br></details></td> </tr> <tr> <td align=left>subversion</td> <td align=center>CVE-2018-11803</td> <td align=center>MEDIUM</td> <td align=center>1.13.0-3</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.securityfocus.com/bid/106770>http://www.securityfocus.com/bid/106770</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803</a><br><a href=https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E>https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E</a><br><a href=https://security.gentoo.org/glsa/201904-08>https://security.gentoo.org/glsa/201904-08</a><br><a href=https://subversion.apache.org/security/CVE-2018-11803-advisory.txt>https://subversion.apache.org/security/CVE-2018-11803-advisory.txt</a><br><a href=https://ubuntu.com/security/notices/USN-3869-1>https://ubuntu.com/security/notices/USN-3869-1</a><br><a href=https://usn.ubuntu.com/3869-1/ >https://usn.ubuntu.com/3869-1/</a><br></details></td> </tr> <tr> <td align=left>subversion</td> <td align=center>CVE-2020-17525</td> <td align=center>MEDIUM</td> <td align=center>1.13.0-3</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525</a><br><a href=https://linux.oracle.com/cve/CVE-2020-17525.html>https://linux.oracle.com/cve/CVE-2020-17525.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-0507.html>https://linux.oracle.com/errata/ELSA-2021-0507.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html>https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html</a><br><a href=https://subversion.apache.org/security/CVE-2020-17525-advisory.txt>https://subversion.apache.org/security/CVE-2020-17525-advisory.txt</a><br><a href=https://ubuntu.com/security/notices/USN-5322-1>https://ubuntu.com/security/notices/USN-5322-1</a><br></details></td> </tr> <tr> <td align=left>sysstat</td> <td align=center>CVE-2019-16167</td> <td align=center>LOW</td> <td align=center>12.2.0-2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html>http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html>http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16167">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16167</a><br><a href=https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6>https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6</a><br><a href=https://github.com/sysstat/sysstat/issues/230>https://github.com/sysstat/sysstat/issues/230</a><br><a href=https://linux.oracle.com/cve/CVE-2019-16167.html>https://linux.oracle.com/cve/CVE-2019-16167.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4638.html>https://linux.oracle.com/errata/ELSA-2020-4638.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/</a><br><a href=https://ubuntu.com/security/notices/USN-4242-1>https://ubuntu.com/security/notices/USN-4242-1</a><br><a href=https://usn.ubuntu.com/4242-1/ >https://usn.ubuntu.com/4242-1/</a><br></details></td> </tr> <tr> <td align=left>systemd</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>systemd</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>systemd</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>systemd-sysv</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>systemd-sysv</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>systemd-sysv</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>systemd-timesyncd</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>systemd-timesyncd</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>systemd-timesyncd</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>tar</td> <td align=center>CVE-2021-20193</td> <td align=center>LOW</td> <td align=center>1.30+dfsg-7ubuntu0.20.04.1</td> <td align=center>1.30+dfsg-7ubuntu0.20.04.2</td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href=https://savannah.gnu.org/bugs/?59897>https://savannah.gnu.org/bugs/?59897</a><br><a href=https://security.gentoo.org/glsa/202105-29>https://security.gentoo.org/glsa/202105-29</a><br><a href=https://ubuntu.com/security/notices/USN-5329-1>https://ubuntu.com/security/notices/USN-5329-1</a><br></details></td> </tr> <tr> <td align=left>udev</td> <td align=center>CVE-2021-33910</td> <td align=center>HIGH</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html>http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910</a><br><a href=https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b>https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b</a><br><a href=https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce>https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce</a><br><a href=https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538>https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538</a><br><a href=https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61>https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61</a><br><a href=https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b>https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b</a><br><a href=https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9>https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-33910.html>https://linux.oracle.com/cve/CVE-2021-33910.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-2717.html>https://linux.oracle.com/errata/ELSA-2021-2717.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20211104-0008/ >https://security.netapp.com/advisory/ntap-20211104-0008/</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br><a href=https://www.debian.org/security/2021/dsa-4942>https://www.debian.org/security/2021/dsa-4942</a><br><a href=https://www.openwall.com/lists/oss-security/2021/07/20/2>https://www.openwall.com/lists/oss-security/2021/07/20/2</a><br><a href=https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt>https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a><br></details></td> </tr> <tr> <td align=left>udev</td> <td align=center>CVE-2021-3997</td> <td align=center>MEDIUM</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.15</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href=https://ubuntu.com/security/notices/USN-5226-1>https://ubuntu.com/security/notices/USN-5226-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/10/2>https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details></td> </tr> <tr> <td align=left>udev</td> <td align=center>CVE-2020-13529</td> <td align=center>LOW</td> <td align=center>245.4-4ubuntu3.7</td> <td align=center>245.4-4ubuntu3.10</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/08/04/2>http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href=http://www.openwall.com/lists/oss-security/2021/08/17/3>http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href=http://www.openwall.com/lists/oss-security/2021/09/07/3>http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href=https://linux.oracle.com/cve/CVE-2020-13529.html>https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4361.html>https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href=https://security.gentoo.org/glsa/202107-48>https://security.gentoo.org/glsa/202107-48</a><br><a href=https://security.netapp.com/advisory/ntap-20210625-0005/ >https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href=https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142>https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href=https://ubuntu.com/security/notices/USN-5013-1>https://ubuntu.com/security/notices/USN-5013-1</a><br><a href=https://ubuntu.com/security/notices/USN-5013-2>https://ubuntu.com/security/notices/USN-5013-2</a><br></details></td> </tr> <tr> <td align=left>udisks2</td> <td align=center>CVE-2021-3802</td> <td align=center>LOW</td> <td align=center>2.8.4-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2021-3802>https://access.redhat.com/security/cve/CVE-2021-3802</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2003649">https://bugzilla.redhat.com/show_bug.cgi?id=2003649</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802</a><br><a href=https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4>https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4</a><br><a href=https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt>https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt</a><br></details></td> </tr> <tr> <td align=left>unzip</td> <td align=center>CVE-2022-0529</td> <td align=center>MEDIUM</td> <td align=center>6.0-25ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2051395">https://bugzilla.redhat.com/show_bug.cgi?id=2051395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529</a><br><a href=https://github.com/ByteHackr/unzip_poc>https://github.com/ByteHackr/unzip_poc</a><br></details></td> </tr> <tr> <td align=left>unzip</td> <td align=center>CVE-2021-4217</td> <td align=center>LOW</td> <td align=center>6.0-25ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217</a><br></details></td> </tr> <tr> <td align=left>unzip</td> <td align=center>CVE-2022-0530</td> <td align=center>LOW</td> <td align=center>6.0-25ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2051395">https://bugzilla.redhat.com/show_bug.cgi?id=2051395</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530</a><br><a href=https://github.com/ByteHackr/unzip_poc>https://github.com/ByteHackr/unzip_poc</a><br></details></td> </tr> <tr> <td align=left>util-linux</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>util-linux</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>uuid-dev</td> <td align=center>CVE-2021-3995</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>uuid-dev</td> <td align=center>CVE-2021-3996</td> <td align=center>MEDIUM</td> <td align=center>2.34-0.1ubuntu9.1</td> <td align=center>2.34-0.1ubuntu9.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href=https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes>https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href=https://ubuntu.com/security/notices/USN-5279-1>https://ubuntu.com/security/notices/USN-5279-1</a><br><a href=https://www.openwall.com/lists/oss-security/2022/01/24/2>https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3770</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href=https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e>https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href=https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9>https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365>https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ >https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3778</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778</a><br><a href=https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f>https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f</a><br><a href=https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273>https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3778.html>https://linux.oracle.com/cve/CVE-2021-3778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3796</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796</a><br><a href=https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3>https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3</a><br><a href=https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d>https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3796.html>https://linux.oracle.com/cve/CVE-2021-3796.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3872</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872</a><br><a href=https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b>https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b</a><br><a href=https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8>https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3872.html>https://linux.oracle.com/cve/CVE-2021-3872.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3927</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927</a><br><a href=https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e>https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e</a><br><a href=https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0>https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3928</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928</a><br><a href=https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732>https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732</a><br><a href=https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd>https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3984</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href=https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655>https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href=https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a>https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3984.html>https://linux.oracle.com/cve/CVE-2021-3984.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-4019</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href=https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142>https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href=https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92>https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4019.html>https://linux.oracle.com/cve/CVE-2021-4019.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-4069</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069</a><br><a href=https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9>https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href=https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74>https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-4166</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href=https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682>https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href=https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035>https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2022-0351</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href=https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d>https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href=https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161>https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2022-0359</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href=https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1>https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href=https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def>https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0359.html>https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2022-0361</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href=https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366>https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href=https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b>https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0361.html>https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2022-0368</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href=https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa>https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9>https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ >https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3903</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903</a><br><a href=https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43>https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43</a><br><a href=https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8>https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim</td> <td align=center>CVE-2021-3974</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974</a><br><a href=https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6>https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)</a><br><a href=https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4>https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3770</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href=https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e>https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href=https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9>https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365>https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ >https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3778</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778</a><br><a href=https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f>https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f</a><br><a href=https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273>https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3778.html>https://linux.oracle.com/cve/CVE-2021-3778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3796</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796</a><br><a href=https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3>https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3</a><br><a href=https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d>https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3796.html>https://linux.oracle.com/cve/CVE-2021-3796.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3872</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872</a><br><a href=https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b>https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b</a><br><a href=https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8>https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3872.html>https://linux.oracle.com/cve/CVE-2021-3872.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3927</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927</a><br><a href=https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e>https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e</a><br><a href=https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0>https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3928</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928</a><br><a href=https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732>https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732</a><br><a href=https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd>https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3984</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href=https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655>https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href=https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a>https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3984.html>https://linux.oracle.com/cve/CVE-2021-3984.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-4019</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href=https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142>https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href=https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92>https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4019.html>https://linux.oracle.com/cve/CVE-2021-4019.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-4069</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069</a><br><a href=https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9>https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href=https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74>https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-4166</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href=https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682>https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href=https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035>https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2022-0351</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href=https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d>https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href=https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161>https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2022-0359</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href=https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1>https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href=https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def>https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0359.html>https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2022-0361</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href=https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366>https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href=https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b>https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0361.html>https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2022-0368</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href=https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa>https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9>https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ >https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3903</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903</a><br><a href=https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43>https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43</a><br><a href=https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8>https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-common</td> <td align=center>CVE-2021-3974</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974</a><br><a href=https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6>https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)</a><br><a href=https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4>https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3770</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href=https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e>https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href=https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9>https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365>https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ >https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3778</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778</a><br><a href=https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f>https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f</a><br><a href=https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273>https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3778.html>https://linux.oracle.com/cve/CVE-2021-3778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3796</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796</a><br><a href=https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3>https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3</a><br><a href=https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d>https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3796.html>https://linux.oracle.com/cve/CVE-2021-3796.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3872</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872</a><br><a href=https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b>https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b</a><br><a href=https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8>https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3872.html>https://linux.oracle.com/cve/CVE-2021-3872.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3927</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927</a><br><a href=https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e>https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e</a><br><a href=https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0>https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3928</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928</a><br><a href=https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732>https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732</a><br><a href=https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd>https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3984</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href=https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655>https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href=https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a>https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3984.html>https://linux.oracle.com/cve/CVE-2021-3984.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-4019</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href=https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142>https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href=https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92>https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4019.html>https://linux.oracle.com/cve/CVE-2021-4019.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-4069</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069</a><br><a href=https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9>https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href=https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74>https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-4166</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href=https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682>https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href=https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035>https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2022-0351</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href=https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d>https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href=https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161>https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2022-0359</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href=https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1>https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href=https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def>https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0359.html>https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2022-0361</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href=https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366>https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href=https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b>https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0361.html>https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2022-0368</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href=https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa>https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9>https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ >https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3903</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903</a><br><a href=https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43>https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43</a><br><a href=https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8>https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>vim-runtime</td> <td align=center>CVE-2021-3974</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974</a><br><a href=https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6>https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)</a><br><a href=https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4>https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>wget</td> <td align=center>CVE-2021-31879</td> <td align=center>MEDIUM</td> <td align=center>1.20.3-1ubuntu1</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href=https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html>https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href=https://savannah.gnu.org/bugs/?56909>https://savannah.gnu.org/bugs/?56909</a><br><a href=https://security.netapp.com/advisory/ntap-20210618-0002/ >https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details></td> </tr> <tr> <td align=left>x11-common</td> <td align=center>CVE-2012-1093</td> <td align=center>LOW</td> <td align=center>1:7.7+19ubuntu14</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://vladz.devzero.fr/012_x11-common-vuln.html>http://vladz.devzero.fr/012_x11-common-vuln.html</a><br><a href=http://www.openwall.com/lists/oss-security/2012/02/29/1>http://www.openwall.com/lists/oss-security/2012/02/29/1</a><br><a href=http://www.openwall.com/lists/oss-security/2012/03/01/1>http://www.openwall.com/lists/oss-security/2012/03/01/1</a><br><a href=https://access.redhat.com/security/cve/cve-2012-1093>https://access.redhat.com/security/cve/cve-2012-1093</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093</a><br><a href=https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E>https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href=https://security-tracker.debian.org/tracker/CVE-2012-1093>https://security-tracker.debian.org/tracker/CVE-2012-1093</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3770</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href=https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e>https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href=https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9>https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365>https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href=https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ >https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3778</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778</a><br><a href=https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f>https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f</a><br><a href=https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273>https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3778.html>https://linux.oracle.com/cve/CVE-2021-3778.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3796</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/10/01/1>http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796</a><br><a href=https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3>https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3</a><br><a href=https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d>https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3796.html>https://linux.oracle.com/cve/CVE-2021-3796.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4517.html>https://linux.oracle.com/errata/ELSA-2021-4517.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/</a><br><a href=https://ubuntu.com/security/notices/USN-5093-1>https://ubuntu.com/security/notices/USN-5093-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3872</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872</a><br><a href=https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b>https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b</a><br><a href=https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8>https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3872.html>https://linux.oracle.com/cve/CVE-2021-3872.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3927</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927</a><br><a href=https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e>https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e</a><br><a href=https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0>https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3928</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928</a><br><a href=https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732>https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732</a><br><a href=https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd>https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3984</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href=https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655>https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href=https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a>https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3984.html>https://linux.oracle.com/cve/CVE-2021-3984.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-4019</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href=https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142>https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href=https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92>https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href=https://linux.oracle.com/cve/CVE-2021-4019.html>https://linux.oracle.com/cve/CVE-2021-4019.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0366.html>https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-4069</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069</a><br><a href=https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9>https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href=https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74>https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-4166</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2022/Mar/29>http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href=https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682>https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href=https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035>https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href=https://support.apple.com/kb/HT213183>https://support.apple.com/kb/HT213183</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2022-0351</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href=https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d>https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href=https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161>https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2022-0359</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href=https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1>https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href=https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def>https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0359.html>https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2022-0361</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href=https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366>https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href=https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b>https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href=https://linux.oracle.com/cve/CVE-2022-0361.html>https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0894.html>https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2022-0368</td> <td align=center>MEDIUM</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center></td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href=https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa>https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9>https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href=https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ >https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3903</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903</a><br><a href=https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43>https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43</a><br><a href=https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8>https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://ubuntu.com/security/notices/USN-5147-1>https://ubuntu.com/security/notices/USN-5147-1</a><br></details></td> </tr> <tr> <td align=left>xxd</td> <td align=center>CVE-2021-3974</td> <td align=center>LOW</td> <td align=center>2:8.1.2269-1ubuntu5</td> <td align=center>2:8.1.2269-1ubuntu5.6</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/01/15/1>http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974</a><br><a href=https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6>https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)</a><br><a href=https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4>https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href=https://ubuntu.com/security/notices/USN-5247-1>https://ubuntu.com/security/notices/USN-5247-1</a><br></details></td> </tr> <tr> <td align=left>zlib1g</td> <td align=center>CVE-2018-25032</td> <td align=center>MEDIUM</td> <td align=center>1:1.2.11.dfsg-2ubuntu1.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/25/2>http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href=http://www.openwall.com/lists/oss-security/2022/03/26/1>http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href=https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531>https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href=https://www.openwall.com/lists/oss-security/2022/03/24/1>https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details></td> </tr> <tr> <td align=left>zlib1g-dev</td> <td align=center>CVE-2018-25032</td> <td align=center>MEDIUM</td> <td align=center>1:1.2.11.dfsg-2ubuntu1.2</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2022/03/25/2>http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href=http://www.openwall.com/lists/oss-security/2022/03/26/1>http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href=https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531>https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href=https://www.openwall.com/lists/oss-security/2022/03/24/1>https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details></td> </tr> <tr> <td align=left>zsh</td> <td align=center>CVE-2021-45444</td> <td align=center>LOW</td> <td align=center>5.8-3ubuntu1</td> <td align=center>5.8-3ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html>https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/</a><br><a href=https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/ >https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/</a><br><a href=https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/ >https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/</a><br><a href=https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/ >https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/</a><br><a href=https://ubuntu.com/security/notices/USN-5325-1>https://ubuntu.com/security/notices/USN-5325-1</a><br><a href=https://vuln.ryotak.me/advisories/63>https://vuln.ryotak.me/advisories/63</a><br><a href=https://www.debian.org/security/2022/dsa-5078>https://www.debian.org/security/2022/dsa-5078</a><br><a href=https://www.zsh.org/mla/announce/msg00133.html>https://www.zsh.org/mla/announce/msg00133.html</a><br><a href=https://zsh.sourceforge.io/releases.html>https://zsh.sourceforge.io/releases.html</a><br></details></td> </tr> <tr> <td align=left>zsh-common</td> <td align=center>CVE-2021-45444</td> <td align=center>LOW</td> <td align=center>5.8-3ubuntu1</td> <td align=center>5.8-3ubuntu1.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html>https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/</a><br><a href=https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/ >https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/</a><br><a href=https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/ >https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/</a><br><a href=https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/ >https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/</a><br><a href=https://ubuntu.com/security/notices/USN-5325-1>https://ubuntu.com/security/notices/USN-5325-1</a><br><a href=https://vuln.ryotak.me/advisories/63>https://vuln.ryotak.me/advisories/63</a><br><a href=https://www.debian.org/security/2022/dsa-5078>https://www.debian.org/security/2022/dsa-5078</a><br><a href=https://www.zsh.org/mla/announce/msg00133.html>https://www.zsh.org/mla/announce/msg00133.html</a><br><a href=https://zsh.sourceforge.io/releases.html>https://zsh.sourceforge.io/releases.html</a><br></details></td> </tr> </tbody> </table> <p><strong>jar</strong></p> <table> <thead> <tr> <th align=left>No Vulnerabilities found</th> </tr> </thead> <tbody> <tr> <td></td> </tr> </tbody> </table> <p><strong>node-pkg</strong></p> <table> <thead> <tr> <th align=left>Package</th> <th align=center>Vulnerability</th> <th align=center>Severity</th> <th align=center>Installed Version</th> <th align=center>Fixed Version</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>@npmcli/arborist</td> <td align=center>CVE-2021-39134</td> <td align=center>HIGH</td> <td align=center>2.6.4</td> <td align=center>2.8.2</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-2h3h-q99f-3fhc>https://github.com/advisories/GHSA-2h3h-q99f-3fhc</a><br><a href=https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc>https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-39134>https://nvd.nist.gov/vuln/detail/CVE-2021-39134</a><br><a href=https://www.npmjs.com/package/@npmcli/arborist>https://www.npmjs.com/package/@npmcli/arborist</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>@npmcli/arborist</td> <td align=center>CVE-2021-39135</td> <td align=center>HIGH</td> <td align=center>2.6.4</td> <td align=center>2.8.2</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-gmw6-94gg-2rc2>https://github.com/advisories/GHSA-gmw6-94gg-2rc2</a><br><a href=https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2>https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-39135>https://nvd.nist.gov/vuln/detail/CVE-2021-39135</a><br><a href=https://www.npmjs.com/package/@npmcli/arborist>https://www.npmjs.com/package/@npmcli/arborist</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>ansi-regex</td> <td align=center>CVE-2021-3807</td> <td align=center>HIGH</td> <td align=center>5.0.0</td> <td align=center>4.1.1, 5.0.1, 6.0.1</td> <td><details><summary>Expand...</summary><a href=https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908>https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href=https://github.com/advisories/GHSA-93q8-gq69-wqmw>https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href=https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9>https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href=https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311>https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href=https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774>https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href=https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994>https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3807.html>https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0350.html>https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-3807>https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br></details></td> </tr> <tr> <td align=left>code-server</td> <td align=center>CVE-2021-3810</td> <td align=center>HIGH</td> <td align=center>3.10.2</td> <td align=center>3.12.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-49x3-8228-3w3m>https://github.com/advisories/GHSA-49x3-8228-3w3m</a><br><a href=https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5>https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5</a><br><a href=https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223>https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-3810>https://nvd.nist.gov/vuln/detail/CVE-2021-3810</a><br></details></td> </tr> <tr> <td align=left>engine.io</td> <td align=center>CVE-2022-21676</td> <td align=center>HIGH</td> <td align=center>5.1.1</td> <td align=center>6.1.1, 5.2.1, 4.1.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-273r-mgr4-v34f>https://github.com/advisories/GHSA-273r-mgr4-v34f</a><br><a href=https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab>https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab</a><br><a href=https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db>https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db</a><br><a href=https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c>https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c</a><br><a href=https://github.com/socketio/engine.io/releases/tag/4.1.2>https://github.com/socketio/engine.io/releases/tag/4.1.2</a><br><a href=https://github.com/socketio/engine.io/releases/tag/5.2.1>https://github.com/socketio/engine.io/releases/tag/5.2.1</a><br><a href=https://github.com/socketio/engine.io/releases/tag/6.1.1>https://github.com/socketio/engine.io/releases/tag/6.1.1</a><br><a href=https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f>https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21676>https://nvd.nist.gov/vuln/detail/CVE-2022-21676</a><br></details></td> </tr> <tr> <td align=left>follow-redirects</td> <td align=center>CVE-2022-0155</td> <td align=center>MEDIUM</td> <td align=center>1.14.1</td> <td align=center>1.14.7</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-74fj-2j2h-c42q>https://github.com/advisories/GHSA-74fj-2j2h-c42q</a><br><a href=https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22>https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22</a><br><a href=https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406>https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-0155>https://nvd.nist.gov/vuln/detail/CVE-2022-0155</a><br></details></td> </tr> <tr> <td align=left>follow-redirects</td> <td align=center>CVE-2022-0536</td> <td align=center>MEDIUM</td> <td align=center>1.14.1</td> <td align=center>1.14.8</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-pw2r-vq6v-hr8c>https://github.com/advisories/GHSA-pw2r-vq6v-hr8c</a><br><a href=https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445>https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445</a><br><a href=https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db>https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-0536>https://nvd.nist.gov/vuln/detail/CVE-2022-0536</a><br></details></td> </tr> <tr> <td align=left>grunt</td> <td align=center>CVE-2020-7729</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>1.3.0</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7729</a><br><a href=https://github.com/advisories/GHSA-m5pj-vjjf-4m3h>https://github.com/advisories/GHSA-m5pj-vjjf-4m3h</a><br><a href=https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249>https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249</a><br><a href=https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7>https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html>https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-7729>https://nvd.nist.gov/vuln/detail/CVE-2020-7729</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922</a><br><a href=https://snyk.io/vuln/SNYK-JS-GRUNT-597546>https://snyk.io/vuln/SNYK-JS-GRUNT-597546</a><br><a href=https://ubuntu.com/security/notices/USN-4595-1>https://ubuntu.com/security/notices/USN-4595-1</a><br><a href=https://usn.ubuntu.com/4595-1/ >https://usn.ubuntu.com/4595-1/</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>CVE-2019-19919</td> <td align=center>CRITICAL</td> <td align=center>1.0.0</td> <td align=center>4.3.0</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919</a><br><a href=https://github.com/advisories/GHSA-w457-6q6x-cgp9>https://github.com/advisories/GHSA-w457-6q6x-cgp9</a><br><a href=https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc>https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc</a><br><a href=https://github.com/wycats/handlebars.js/issues/1558>https://github.com/wycats/handlebars.js/issues/1558</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-19919>https://nvd.nist.gov/vuln/detail/CVE-2019-19919</a><br><a href=https://www.npmjs.com/advisories/1164>https://www.npmjs.com/advisories/1164</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>CVE-2021-23369</td> <td align=center>CRITICAL</td> <td align=center>1.0.0</td> <td align=center>4.7.7</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369</a><br><a href=https://github.com/advisories/GHSA-f2jv-r9rf-7988>https://github.com/advisories/GHSA-f2jv-r9rf-7988</a><br><a href=https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8>https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8</a><br><a href=https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427>https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-23369>https://nvd.nist.gov/vuln/detail/CVE-2021-23369</a><br><a href=https://security.netapp.com/advisory/ntap-20210604-0008/ >https://security.netapp.com/advisory/ntap-20210604-0008/</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952</a><br><a href=https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767>https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>CVE-2021-23383</td> <td align=center>CRITICAL</td> <td align=center>1.0.0</td> <td align=center>4.7.7</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-765h-qjxv-5f44>https://github.com/advisories/GHSA-765h-qjxv-5f44</a><br><a href=https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427>https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-23383>https://nvd.nist.gov/vuln/detail/CVE-2021-23383</a><br><a href=https://security.netapp.com/advisory/ntap-20210618-0007/ >https://security.netapp.com/advisory/ntap-20210618-0007/</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030</a><br><a href=https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029>https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029</a><br><a href=https://www.npmjs.com/package/handlebars>https://www.npmjs.com/package/handlebars</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>CVE-2019-20920</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>4.5.3, 3.0.8</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-3cqr-58rm-57f8>https://github.com/advisories/GHSA-3cqr-58rm-57f8</a><br><a href=https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-20920>https://nvd.nist.gov/vuln/detail/CVE-2019-20920</a><br><a href=https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478>https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478</a><br><a href=https://www.npmjs.com/advisories/1316>https://www.npmjs.com/advisories/1316</a><br><a href=https://www.npmjs.com/advisories/1324>https://www.npmjs.com/advisories/1324</a><br><a href=https://www.npmjs.com/package/handlebars>https://www.npmjs.com/package/handlebars</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>GHSA-2cf5-4w76-r9qv</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>4.5.2, 3.0.8</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-2cf5-4w76-r9qv>https://github.com/advisories/GHSA-2cf5-4w76-r9qv</a><br><a href=https://www.npmjs.com/advisories/1316>https://www.npmjs.com/advisories/1316</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>GHSA-g9r4-xpmj-mj65</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>4.5.3, 3.0.8</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-g9r4-xpmj-mj65>https://github.com/advisories/GHSA-g9r4-xpmj-mj65</a><br><a href=https://www.npmjs.com/advisories/1325>https://www.npmjs.com/advisories/1325</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>GHSA-q2c6-c6pm-g3gh</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>4.5.3, 3.0.8</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-q2c6-c6pm-g3gh>https://github.com/advisories/GHSA-q2c6-c6pm-g3gh</a><br><a href=https://www.npmjs.com/advisories/1324>https://www.npmjs.com/advisories/1324</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>GHSA-q42p-pg8m-cqh6</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>3.0.7, 4.0.14, 4.1.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-q42p-pg8m-cqh6>https://github.com/advisories/GHSA-q42p-pg8m-cqh6</a><br><a href=https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86>https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86</a><br><a href=https://github.com/handlebars-lang/handlebars.js/issues/1495>https://github.com/handlebars-lang/handlebars.js/issues/1495</a><br><a href=https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692>https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692</a><br><a href=https://www.npmjs.com/advisories/755>https://www.npmjs.com/advisories/755</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>CVE-2015-8861</td> <td align=center>MEDIUM</td> <td align=center>1.0.0</td> <td align=center>&gt;=4.0.0</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2016/04/20/11>http://www.openwall.com/lists/oss-security/2016/04/20/11</a><br><a href=http://www.securityfocus.com/bid/96434>http://www.securityfocus.com/bid/96434</a><br><a href=https://blog.srcclr.com/handlebars_vulnerability_research_findings/ >https://blog.srcclr.com/handlebars_vulnerability_research_findings/</a><br><a href=https://github.com/advisories/GHSA-9prh-257w-9277>https://github.com/advisories/GHSA-9prh-257w-9277</a><br><a href=https://github.com/wycats/handlebars.js/pull/1083>https://github.com/wycats/handlebars.js/pull/1083</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2015-8861>https://nvd.nist.gov/vuln/detail/CVE-2015-8861</a><br><a href=https://www.npmjs.com/advisories/61>https://www.npmjs.com/advisories/61</a><br><a href=https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/ >https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/</a><br><a href=https://www.tenable.com/security/tns-2016-18>https://www.tenable.com/security/tns-2016-18</a><br></details></td> </tr> <tr> <td align=left>handlebars</td> <td align=center>NSWG-ECO-519</td> <td align=center>MEDIUM</td> <td align=center>1.0.0</td> <td align=center>&gt;=4.6.0</td> <td><details><summary>Expand...</summary><a href=https://hackerone.com/reports/726364>https://hackerone.com/reports/726364</a><br></details></td> </tr> <tr> <td align=left>ini</td> <td align=center>CVE-2020-7788</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>1.3.6</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a><br><a href=https://github.com/advisories/GHSA-qqgx-2p2h-9c37>https://github.com/advisories/GHSA-qqgx-2p2h-9c37</a><br><a href=https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1>https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1</a><br><a href="https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)">https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)</a><br><a href=https://linux.oracle.com/cve/CVE-2020-7788.html>https://linux.oracle.com/cve/CVE-2020-7788.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0350.html>https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html>https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-7788>https://nvd.nist.gov/vuln/detail/CVE-2020-7788</a><br><a href=https://snyk.io/vuln/SNYK-JS-INI-1048974>https://snyk.io/vuln/SNYK-JS-INI-1048974</a><br><a href=https://www.npmjs.com/advisories/1589>https://www.npmjs.com/advisories/1589</a><br></details></td> </tr> <tr> <td align=left>jquery-ui</td> <td align=center>CVE-2021-41182</td> <td align=center>MEDIUM</td> <td align=center>1.12.1</td> <td align=center>1.13.0</td> <td><details><summary>Expand...</summary><a href=https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/ >https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/</a><br><a href=https://github.com/advisories/GHSA-9gj3-hwp5-pmwc>https://github.com/advisories/GHSA-9gj3-hwp5-pmwc</a><br><a href=https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63>https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63</a><br><a href=https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc>https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41182>https://nvd.nist.gov/vuln/detail/CVE-2021-41182</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0004/ >https://security.netapp.com/advisory/ntap-20211118-0004/</a><br><a href=https://www.drupal.org/sa-contrib-2022-004>https://www.drupal.org/sa-contrib-2022-004</a><br><a href=https://www.drupal.org/sa-core-2022-002>https://www.drupal.org/sa-core-2022-002</a><br></details></td> </tr> <tr> <td align=left>jquery-ui</td> <td align=center>CVE-2021-41183</td> <td align=center>MEDIUM</td> <td align=center>1.12.1</td> <td align=center>1.13.0</td> <td><details><summary>Expand...</summary><a href=https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/ >https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/</a><br><a href=https://bugs.jqueryui.com/ticket/15284>https://bugs.jqueryui.com/ticket/15284</a><br><a href=https://github.com/advisories/GHSA-j7qv-pgf6-hvh4>https://github.com/advisories/GHSA-j7qv-pgf6-hvh4</a><br><a href=https://github.com/jquery/jquery-ui/pull/1953>https://github.com/jquery/jquery-ui/pull/1953</a><br><a href=https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4>https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41183>https://nvd.nist.gov/vuln/detail/CVE-2021-41183</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0004/ >https://security.netapp.com/advisory/ntap-20211118-0004/</a><br><a href=https://www.drupal.org/sa-contrib-2022-004>https://www.drupal.org/sa-contrib-2022-004</a><br><a href=https://www.drupal.org/sa-core-2022-001>https://www.drupal.org/sa-core-2022-001</a><br><a href=https://www.drupal.org/sa-core-2022-002>https://www.drupal.org/sa-core-2022-002</a><br></details></td> </tr> <tr> <td align=left>jquery-ui</td> <td align=center>CVE-2021-41184</td> <td align=center>MEDIUM</td> <td align=center>1.12.1</td> <td align=center>1.13.0</td> <td><details><summary>Expand...</summary><a href=https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/ >https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/</a><br><a href=https://github.com/advisories/GHSA-gpqq-952q-5327>https://github.com/advisories/GHSA-gpqq-952q-5327</a><br><a href=https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280>https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280</a><br><a href=https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327>https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41184>https://nvd.nist.gov/vuln/detail/CVE-2021-41184</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0004/ >https://security.netapp.com/advisory/ntap-20211118-0004/</a><br><a href=https://www.drupal.org/sa-core-2022-001>https://www.drupal.org/sa-core-2022-001</a><br></details></td> </tr> <tr> <td align=left>json</td> <td align=center>CVE-2020-7712</td> <td align=center>HIGH</td> <td align=center>1.0.0</td> <td align=center>10.0.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-3c6g-pvg8-gqw2>https://github.com/advisories/GHSA-3c6g-pvg8-gqw2</a><br><a href=https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483>https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483</a><br><a href=https://github.com/trentm/json/issues/144>https://github.com/trentm/json/issues/144</a><br><a href=https://github.com/trentm/json/pull/145>https://github.com/trentm/json/pull/145</a><br><a href=https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E>https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E>https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E>https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E>https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E>https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-7712>https://nvd.nist.gov/vuln/detail/CVE-2020-7712</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931</a><br><a href=https://snyk.io/vuln/SNYK-JS-JSON-597481>https://snyk.io/vuln/SNYK-JS-JSON-597481</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>markdown</td> <td align=center>GHSA-wx77-rp39-c6vg</td> <td align=center>LOW</td> <td align=center>1.0.0</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-wx77-rp39-c6vg>https://github.com/advisories/GHSA-wx77-rp39-c6vg</a><br><a href=https://www.npmjs.com/advisories/1330>https://www.npmjs.com/advisories/1330</a><br></details></td> </tr> <tr> <td align=left>minimist</td> <td align=center>CVE-2021-44906</td> <td align=center>CRITICAL</td> <td align=center>1.2.5</td> <td align=center>1.2.6</td> <td><details><summary>Expand...</summary><a href=https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip>https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip</a><br><a href=https://github.com/advisories/GHSA-xvch-5gv4-984h>https://github.com/advisories/GHSA-xvch-5gv4-984h</a><br><a href=https://github.com/substack/minimist/blob/master/index.js#L69>https://github.com/substack/minimist/blob/master/index.js#L69</a><br><a href=https://github.com/substack/minimist/issues/164>https://github.com/substack/minimist/issues/164</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-44906>https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a><br><a href=https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764>https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href=https://snyk.io/vuln/SNYK-JS-MINIMIST-559764>https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href=https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068>https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068</a><br></details></td> </tr> <tr> <td align=left>nbdime-jupyterlab</td> <td align=center>CVE-2021-41134</td> <td align=center>MEDIUM</td> <td align=center>2.1.0</td> <td align=center>2.1.1, 1.0.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-p6rw-44q7-3fw4>https://github.com/advisories/GHSA-p6rw-44q7-3fw4</a><br><a href=https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea>https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea</a><br><a href=https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4>https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41134>https://nvd.nist.gov/vuln/detail/CVE-2021-41134</a><br></details></td> </tr> <tr> <td align=left>node-fetch</td> <td align=center>CVE-2022-0235</td> <td align=center>MEDIUM</td> <td align=center>2.6.1</td> <td align=center>2.6.7, 3.1.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-r683-j2x4-v87g>https://github.com/advisories/GHSA-r683-j2x4-v87g</a><br><a href=https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10>https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10</a><br><a href=https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60>https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60</a><br><a href=https://github.com/node-fetch/node-fetch/pull/1453>https://github.com/node-fetch/node-fetch/pull/1453</a><br><a href=https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7>https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7</a><br><a href=https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/ >https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-0235>https://nvd.nist.gov/vuln/detail/CVE-2022-0235</a><br></details></td> </tr> <tr> <td align=left>npm</td> <td align=center>CVE-2016-3956</td> <td align=center>HIGH</td> <td align=center>1.0.1</td> <td align=center>&gt;= 2.15.1 &lt;= 3.0.0, &gt;= 3.8.3</td> <td><details><summary>Expand...</summary><a href=http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability>http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability</a><br><a href="http://www-01.ibm.com/support/docview.wss?uid=swg21980827">http://www-01.ibm.com/support/docview.wss?uid=swg21980827</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3956">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3956</a><br><a href=https://github.com/advisories/GHSA-m5h6-hr3q-22h5>https://github.com/advisories/GHSA-m5h6-hr3q-22h5</a><br><a href=https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29>https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29</a><br><a href=https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401>https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401</a><br><a href=https://github.com/npm/npm/issues/8380>https://github.com/npm/npm/issues/8380</a><br><a href=https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/ >https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/</a><br><a href=https://nodesecurity.io/advisories/98>https://nodesecurity.io/advisories/98</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2016-3956>https://nvd.nist.gov/vuln/detail/CVE-2016-3956</a><br><a href=https://www.npmjs.com/advisories/98>https://www.npmjs.com/advisories/98</a><br></details></td> </tr> <tr> <td align=left>npm</td> <td align=center>CVE-2019-16776</td> <td align=center>HIGH</td> <td align=center>1.0.1</td> <td align=center>6.13.3</td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html>http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html</a><br><a href=https://access.redhat.com/errata/RHEA-2020:0330>https://access.redhat.com/errata/RHEA-2020:0330</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0573>https://access.redhat.com/errata/RHSA-2020:0573</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0579>https://access.redhat.com/errata/RHSA-2020:0579</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0597>https://access.redhat.com/errata/RHSA-2020:0597</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0602>https://access.redhat.com/errata/RHSA-2020:0602</a><br><a href=https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli>https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a><br><a href=https://github.com/advisories/GHSA-x8qc-rrcw-4r46>https://github.com/advisories/GHSA-x8qc-rrcw-4r46</a><br><a href=https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46>https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46</a><br><a href=https://linux.oracle.com/cve/CVE-2019-16776.html>https://linux.oracle.com/cve/CVE-2019-16776.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-0579.html>https://linux.oracle.com/errata/ELSA-2020-0579.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-16776>https://nvd.nist.gov/vuln/detail/CVE-2019-16776</a><br><a href=https://www.npmjs.com/advisories/1436>https://www.npmjs.com/advisories/1436</a><br><a href=https://www.oracle.com/security-alerts/cpujan2020.html>https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details></td> </tr> <tr> <td align=left>npm</td> <td align=center>CVE-2019-16775</td> <td align=center>MEDIUM</td> <td align=center>1.0.1</td> <td align=center>6.13.3</td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html>http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html</a><br><a href=https://access.redhat.com/errata/RHEA-2020:0330>https://access.redhat.com/errata/RHEA-2020:0330</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0573>https://access.redhat.com/errata/RHSA-2020:0573</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0579>https://access.redhat.com/errata/RHSA-2020:0579</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0597>https://access.redhat.com/errata/RHSA-2020:0597</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0602>https://access.redhat.com/errata/RHSA-2020:0602</a><br><a href=https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli>https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a><br><a href=https://github.com/advisories/GHSA-m6cx-g6qm-p2cx>https://github.com/advisories/GHSA-m6cx-g6qm-p2cx</a><br><a href=https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx>https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx</a><br><a href=https://linux.oracle.com/cve/CVE-2019-16775.html>https://linux.oracle.com/cve/CVE-2019-16775.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-0579.html>https://linux.oracle.com/errata/ELSA-2020-0579.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-16775>https://nvd.nist.gov/vuln/detail/CVE-2019-16775</a><br><a href=https://www.npmjs.com/advisories/1434>https://www.npmjs.com/advisories/1434</a><br><a href=https://www.oracle.com/security-alerts/cpujan2020.html>https://www.oracle.com/security-alerts/cpujan2020.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>npm</td> <td align=center>CVE-2019-16777</td> <td align=center>MEDIUM</td> <td align=center>1.0.1</td> <td align=center>6.13.4</td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html>http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html</a><br><a href=https://access.redhat.com/errata/RHEA-2020:0330>https://access.redhat.com/errata/RHEA-2020:0330</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0573>https://access.redhat.com/errata/RHSA-2020:0573</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0579>https://access.redhat.com/errata/RHSA-2020:0579</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0597>https://access.redhat.com/errata/RHSA-2020:0597</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0602>https://access.redhat.com/errata/RHSA-2020:0602</a><br><a href=https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli>https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a><br><a href=https://github.com/advisories/GHSA-4328-8hgf-7wjr>https://github.com/advisories/GHSA-4328-8hgf-7wjr</a><br><a href=https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr>https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr</a><br><a href=https://linux.oracle.com/cve/CVE-2019-16777.html>https://linux.oracle.com/cve/CVE-2019-16777.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-0579.html>https://linux.oracle.com/errata/ELSA-2020-0579.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-16777>https://nvd.nist.gov/vuln/detail/CVE-2019-16777</a><br><a href=https://security.gentoo.org/glsa/202003-48>https://security.gentoo.org/glsa/202003-48</a><br><a href=https://www.npmjs.com/advisories/1437>https://www.npmjs.com/advisories/1437</a><br><a href=https://www.oracle.com/security-alerts/cpujan2020.html>https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details></td> </tr> <tr> <td align=left>npm</td> <td align=center>CVE-2020-15095</td> <td align=center>MEDIUM</td> <td align=center>1.0.1</td> <td align=center>6.14.6</td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html>http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html</a><br><a href=https://github.com/advisories/GHSA-93f3-23rq-pjfp>https://github.com/advisories/GHSA-93f3-23rq-pjfp</a><br><a href=https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07>https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07</a><br><a href=https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc>https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc</a><br><a href=https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp>https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp</a><br><a href=https://linux.oracle.com/cve/CVE-2020-15095.html>https://linux.oracle.com/cve/CVE-2020-15095.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-0548.html>https://linux.oracle.com/errata/ELSA-2021-0548.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-15095>https://nvd.nist.gov/vuln/detail/CVE-2020-15095</a><br><a href=https://security.gentoo.org/glsa/202101-07>https://security.gentoo.org/glsa/202101-07</a><br></details></td> </tr> <tr> <td align=left>npm</td> <td align=center>CVE-2013-4116</td> <td align=center>LOW</td> <td align=center>1.0.1</td> <td align=center>&gt;=1.3.3</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2013/07/10/17>http://www.openwall.com/lists/oss-security/2013/07/10/17</a><br><a href=http://www.openwall.com/lists/oss-security/2013/07/11/9>http://www.openwall.com/lists/oss-security/2013/07/11/9</a><br><a href=http://www.securityfocus.com/bid/61083>http://www.securityfocus.com/bid/61083</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=983917">https://bugzilla.redhat.com/show_bug.cgi?id=983917</a><br><a href=https://exchange.xforce.ibmcloud.com/vulnerabilities/87141>https://exchange.xforce.ibmcloud.com/vulnerabilities/87141</a><br><a href=https://github.com/advisories/GHSA-v3jv-wrf4-5845>https://github.com/advisories/GHSA-v3jv-wrf4-5845</a><br><a href=https://github.com/npm/npm/commit/f4d31693>https://github.com/npm/npm/commit/f4d31693</a><br><a href=https://github.com/npm/npm/issues/3635>https://github.com/npm/npm/issues/3635</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2013-4116>https://nvd.nist.gov/vuln/detail/CVE-2013-4116</a><br><a href=https://www.npmjs.com/advisories/152>https://www.npmjs.com/advisories/152</a><br></details></td> </tr> <tr> <td align=left>pac-resolver</td> <td align=center>CVE-2021-23406</td> <td align=center>CRITICAL</td> <td align=center>4.2.0</td> <td align=center>5.0.0</td> <td><details><summary>Expand...</summary><a href="Upstream patches:">Upstream patches:</a><br><a href=https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e>https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e</a><br><a href=https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5>https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5</a><br><a href=https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0>https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0</a><br><a href=https://github.com/advisories/GHSA-9j49-mfvp-vmhm>https://github.com/advisories/GHSA-9j49-mfvp-vmhm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-23406>https://nvd.nist.gov/vuln/detail/CVE-2021-23406</a><br><a href=https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506>https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506</a><br><a href=https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857>https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857</a><br></details></td> </tr> <tr> <td align=left>pug</td> <td align=center>CVE-2021-21353</td> <td align=center>CRITICAL</td> <td align=center>1.0.0</td> <td align=center>3.0.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-p493-635q-r6gr>https://github.com/advisories/GHSA-p493-635q-r6gr</a><br><a href=https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0>https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0</a><br><a href=https://github.com/pugjs/pug/issues/3312>https://github.com/pugjs/pug/issues/3312</a><br><a href=https://github.com/pugjs/pug/pull/3314>https://github.com/pugjs/pug/pull/3314</a><br><a href=https://github.com/pugjs/pug/releases/tag/pug%403.0.1>https://github.com/pugjs/pug/releases/tag/pug%403.0.1</a><br><a href=https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr>https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-21353>https://nvd.nist.gov/vuln/detail/CVE-2021-21353</a><br><a href=https://www.npmjs.com/package/pug>https://www.npmjs.com/package/pug</a><br><a href=https://www.npmjs.com/package/pug-code-gen>https://www.npmjs.com/package/pug-code-gen</a><br></details></td> </tr> <tr> <td align=left>tar</td> <td align=center>CVE-2021-32803</td> <td align=center>HIGH</td> <td align=center>6.1.0</td> <td align=center>6.1.2, 5.0.7, 4.4.15, 3.2.3</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-r628-mhmh-qjhw>https://github.com/advisories/GHSA-r628-mhmh-qjhw</a><br><a href=https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20>https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20</a><br><a href=https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw>https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw</a><br><a href=https://linux.oracle.com/cve/CVE-2021-32803.html>https://linux.oracle.com/cve/CVE-2021-32803.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3666.html>https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-32803>https://nvd.nist.gov/vuln/detail/CVE-2021-32803</a><br><a href=https://www.npmjs.com/advisories/1771>https://www.npmjs.com/advisories/1771</a><br><a href=https://www.npmjs.com/package/tar>https://www.npmjs.com/package/tar</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tar</td> <td align=center>CVE-2021-32804</td> <td align=center>HIGH</td> <td align=center>6.1.0</td> <td align=center>6.1.1, 5.0.6, 4.4.14, 3.2.2</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-3jfq-g458-7qm9>https://github.com/advisories/GHSA-3jfq-g458-7qm9</a><br><a href=https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4>https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4</a><br><a href=https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9>https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a><br><a href=https://linux.oracle.com/cve/CVE-2021-32804.html>https://linux.oracle.com/cve/CVE-2021-32804.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3666.html>https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-32804>https://nvd.nist.gov/vuln/detail/CVE-2021-32804</a><br><a href=https://www.npmjs.com/advisories/1770>https://www.npmjs.com/advisories/1770</a><br><a href=https://www.npmjs.com/package/tar>https://www.npmjs.com/package/tar</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tar</td> <td align=center>CVE-2021-37701</td> <td align=center>HIGH</td> <td align=center>6.1.0</td> <td align=center>6.1.7, 5.0.8, 4.4.16</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-9r2w-394v-53qc>https://github.com/advisories/GHSA-9r2w-394v-53qc</a><br><a href=https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc>https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a><br><a href=https://linux.oracle.com/cve/CVE-2021-37701.html>https://linux.oracle.com/cve/CVE-2021-37701.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0350.html>https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37701>https://nvd.nist.gov/vuln/detail/CVE-2021-37701</a><br><a href=https://www.debian.org/security/2021/dsa-5008>https://www.debian.org/security/2021/dsa-5008</a><br><a href=https://www.npmjs.com/advisories/1779>https://www.npmjs.com/advisories/1779</a><br><a href=https://www.npmjs.com/package/tar>https://www.npmjs.com/package/tar</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tar</td> <td align=center>CVE-2021-37712</td> <td align=center>HIGH</td> <td align=center>6.1.0</td> <td align=center>6.1.9, 5.0.10, 4.4.18</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-qq89-hq3f-393p>https://github.com/advisories/GHSA-qq89-hq3f-393p</a><br><a href=https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p>https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p</a><br><a href=https://linux.oracle.com/cve/CVE-2021-37712.html>https://linux.oracle.com/cve/CVE-2021-37712.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0350.html>https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37712>https://nvd.nist.gov/vuln/detail/CVE-2021-37712</a><br><a href=https://www.debian.org/security/2021/dsa-5008>https://www.debian.org/security/2021/dsa-5008</a><br><a href=https://www.npmjs.com/advisories/1780>https://www.npmjs.com/advisories/1780</a><br><a href=https://www.npmjs.com/package/tar>https://www.npmjs.com/package/tar</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tar</td> <td align=center>CVE-2021-37713</td> <td align=center>HIGH</td> <td align=center>6.1.0</td> <td align=center>6.1.9, 5.0.10, 4.4.18</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://github.com/advisories/GHSA-5955-9wpr-37jh>https://github.com/advisories/GHSA-5955-9wpr-37jh</a><br><a href=https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh>https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37713>https://nvd.nist.gov/vuln/detail/CVE-2021-37713</a><br><a href=https://www.npmjs.com/package/tar>https://www.npmjs.com/package/tar</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tree-kill</td> <td align=center>CVE-2019-15599</td> <td align=center>CRITICAL</td> <td align=center>1.2.0</td> <td align=center>&gt;=1.2.2</td> <td><details><summary>Expand...</summary><a href=https://hackerone.com/reports/701183>https://hackerone.com/reports/701183</a><br></details></td> </tr> <tr> <td align=left>tree-kill</td> <td align=center>GHSA-884p-74jh-xrg2</td> <td align=center>HIGH</td> <td align=center>1.2.0</td> <td align=center>1.2.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-884p-74jh-xrg2>https://github.com/advisories/GHSA-884p-74jh-xrg2</a><br><a href=https://hackerone.com/reports/701183>https://hackerone.com/reports/701183</a><br><a href=https://www.npmjs.com/advisories/1432>https://www.npmjs.com/advisories/1432</a><br></details></td> </tr> </tbody> </table> <p><strong>python-pkg</strong></p> <table> <thead> <tr> <th align=left>Package</th> <th align=center>Vulnerability</th> <th align=center>Severity</th> <th align=center>Installed Version</th> <th align=center>Fixed Version</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>Glances</td> <td align=center>CVE-2021-23418</td> <td align=center>CRITICAL</td> <td align=center>3.1.7</td> <td align=center>3.2.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23418">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23418</a><br><a href=https://github.com/advisories/GHSA-r2mj-8wgq-73m6>https://github.com/advisories/GHSA-r2mj-8wgq-73m6</a><br><a href=https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94>https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94</a><br><a href=https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a>https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a</a><br><a href=https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32>https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32</a><br><a href=https://github.com/nicolargo/glances/issues/1025>https://github.com/nicolargo/glances/issues/1025</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-23418>https://nvd.nist.gov/vuln/detail/CVE-2021-23418</a><br><a href=https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807>https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807</a><br></details></td> </tr> <tr> <td align=left>Glances</td> <td align=center>CVE-2020-24025</td> <td align=center>MEDIUM</td> <td align=center>3.1.7</td> <td align=center>3.2.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-r8f7-9pfq-mjmv>https://github.com/advisories/GHSA-r8f7-9pfq-mjmv</a><br><a href=https://github.com/sass/node-sass/issues/3067>https://github.com/sass/node-sass/issues/3067</a><br><a href=https://github.com/sass/node-sass/pull/567#issuecomment-656609236>https://github.com/sass/node-sass/pull/567#issuecomment-656609236</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-24025>https://nvd.nist.gov/vuln/detail/CVE-2020-24025</a><br></details></td> </tr> <tr> <td align=left>Glances</td> <td align=center>pyup.io-40900</td> <td align=center>UNKNOWN</td> <td align=center>3.1.7</td> <td align=center>3.2.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>Keras</td> <td align=center>CVE-2021-37678</td> <td align=center>HIGH</td> <td align=center>2.4.3</td> <td align=center>2.6.0rc3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-r6jx-9g48-2r5r>https://github.com/advisories/GHSA-r6jx-9g48-2r5r</a><br><a href=https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012>https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37678>https://nvd.nist.gov/vuln/detail/CVE-2021-37678</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>CVE-2021-34552</td> <td align=center>CRITICAL</td> <td align=center>8.2.0</td> <td align=center>8.3.0</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552</a><br><a href=https://github.com/advisories/GHSA-7534-mm45-c74v>https://github.com/advisories/GHSA-7534-mm45-c74v</a><br><a href=https://github.com/python-pillow/Pillow/pull/5567>https://github.com/python-pillow/Pillow/pull/5567</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html>https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-34552>https://nvd.nist.gov/vuln/detail/CVE-2021-34552</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow>https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/index.html>https://pillow.readthedocs.io/en/stable/releasenotes/index.html</a><br><a href=https://ubuntu.com/security/notices/USN-5227-1>https://ubuntu.com/security/notices/USN-5227-1</a><br><a href=https://ubuntu.com/security/notices/USN-5227-2>https://ubuntu.com/security/notices/USN-5227-2</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>CVE-2022-22815</td> <td align=center>CRITICAL</td> <td align=center>8.2.0</td> <td align=center>9.0.0</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815</a><br><a href=https://github.com/advisories/GHSA-pw3c-h7wp-cvhx>https://github.com/advisories/GHSA-pw3c-h7wp-cvhx</a><br><a href=https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331>https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331</a><br><a href=https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c>https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-22815>https://nvd.nist.gov/vuln/detail/CVE-2022-22815</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling</a><br><a href=https://ubuntu.com/security/notices/USN-5227-1>https://ubuntu.com/security/notices/USN-5227-1</a><br><a href=https://ubuntu.com/security/notices/USN-5227-2>https://ubuntu.com/security/notices/USN-5227-2</a><br><a href=https://www.debian.org/security/2022/dsa-5053>https://www.debian.org/security/2022/dsa-5053</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>CVE-2022-22817</td> <td align=center>CRITICAL</td> <td align=center>8.2.0</td> <td align=center>9.0.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817</a><br><a href=https://github.com/advisories/GHSA-8vj2-vxx3-667w>https://github.com/advisories/GHSA-8vj2-vxx3-667w</a><br><a href=https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11>https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22817.html>https://linux.oracle.com/cve/CVE-2022-22817.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0643.html>https://linux.oracle.com/errata/ELSA-2022-0643.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-22817>https://nvd.nist.gov/vuln/detail/CVE-2022-22817</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security</a><br><a href=https://ubuntu.com/security/notices/USN-5227-1>https://ubuntu.com/security/notices/USN-5227-1</a><br><a href=https://ubuntu.com/security/notices/USN-5227-2>https://ubuntu.com/security/notices/USN-5227-2</a><br><a href=https://www.debian.org/security/2022/dsa-5053>https://www.debian.org/security/2022/dsa-5053</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>CVE-2021-23437</td> <td align=center>HIGH</td> <td align=center>8.2.0</td> <td align=center>8.3.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437</a><br><a href=https://github.com/advisories/GHSA-98vv-pw6r-q6q4>https://github.com/advisories/GHSA-98vv-pw6r-q6q4</a><br><a href=https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b>https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-23437>https://nvd.nist.gov/vuln/detail/CVE-2021-23437</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html>https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html</a><br><a href=https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443>https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443</a><br><a href=https://ubuntu.com/security/notices/USN-5227-1>https://ubuntu.com/security/notices/USN-5227-1</a><br><a href=https://ubuntu.com/security/notices/USN-5227-2>https://ubuntu.com/security/notices/USN-5227-2</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>CVE-2022-22816</td> <td align=center>MEDIUM</td> <td align=center>8.2.0</td> <td align=center>9.0.0</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816</a><br><a href=https://github.com/advisories/GHSA-xrcv-f9gm-v42c>https://github.com/advisories/GHSA-xrcv-f9gm-v42c</a><br><a href=https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331>https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331</a><br><a href=https://linux.oracle.com/cve/CVE-2022-22816.html>https://linux.oracle.com/cve/CVE-2022-22816.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0643.html>https://linux.oracle.com/errata/ELSA-2022-0643.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-22816>https://nvd.nist.gov/vuln/detail/CVE-2022-22816</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling</a><br><a href=https://ubuntu.com/security/notices/USN-5227-1>https://ubuntu.com/security/notices/USN-5227-1</a><br><a href=https://ubuntu.com/security/notices/USN-5227-2>https://ubuntu.com/security/notices/USN-5227-2</a><br><a href=https://www.debian.org/security/2022/dsa-5053>https://www.debian.org/security/2022/dsa-5053</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>CVE-2022-24303</td> <td align=center>MEDIUM</td> <td align=center>8.2.0</td> <td align=center>9.0.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9j59-75qj-795w>https://github.com/advisories/GHSA-9j59-75qj-795w</a><br><a href=https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26>https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-24303>https://nvd.nist.gov/vuln/detail/CVE-2022-24303</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>GHSA-4fx9-vc88-q2xc</td> <td align=center>LOW</td> <td align=center>8.2.0</td> <td align=center>9.0.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4fx9-vc88-q2xc>https://github.com/advisories/GHSA-4fx9-vc88-q2xc</a><br><a href=https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd>https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd</a><br><a href=https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-truncated-file>https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-truncated-file</a><br></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>pyup.io-44524</td> <td align=center>UNKNOWN</td> <td align=center>8.2.0</td> <td align=center>9.0.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>Pillow</td> <td align=center>pyup.io-44525</td> <td align=center>UNKNOWN</td> <td align=center>8.2.0</td> <td align=center>9.0.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>Scrapy</td> <td align=center>CVE-2021-41125</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>1.8.1, 2.5.1</td> <td><details><summary>Expand...</summary><a href=http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth>http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41125">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41125</a><br><a href=https://github.com/advisories/GHSA-jwqp-28gf-p498>https://github.com/advisories/GHSA-jwqp-28gf-p498</a><br><a href=https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6>https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6</a><br><a href=https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498>https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41125>https://nvd.nist.gov/vuln/detail/CVE-2021-41125</a><br><a href=https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header>https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header</a><br></details></td> </tr> <tr> <td align=left>Scrapy</td> <td align=center>CVE-2022-0577</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 1.8.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cjvr-mfj7-j4j8>https://github.com/advisories/GHSA-cjvr-mfj7-j4j8</a><br><a href=https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a>https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a</a><br><a href=https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8>https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8</a><br><a href=https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585>https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html>https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-0577>https://nvd.nist.gov/vuln/detail/CVE-2022-0577</a><br></details></td> </tr> <tr> <td align=left>Scrapy</td> <td align=center>GHSA-mfjm-vh54-3f96</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 1.8.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-mfjm-vh54-3f96>https://github.com/advisories/GHSA-mfjm-vh54-3f96</a><br><a href=https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a>https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a</a><br><a href=https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96>https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96</a><br></details></td> </tr> <tr> <td align=left>Twisted</td> <td align=center>CVE-2022-21712</td> <td align=center>HIGH</td> <td align=center>21.2.0</td> <td align=center>22.1</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21712</a><br><a href=https://github.com/advisories/GHSA-92x2-jw7w-xvvx>https://github.com/advisories/GHSA-92x2-jw7w-xvvx</a><br><a href=https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2>https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2</a><br><a href=https://github.com/twisted/twisted/releases/tag/twisted-22.1.0>https://github.com/twisted/twisted/releases/tag/twisted-22.1.0</a><br><a href=https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx>https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html>https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21712>https://nvd.nist.gov/vuln/detail/CVE-2022-21712</a><br></details></td> </tr> <tr> <td align=left>Werkzeug</td> <td align=center>pyup.io-42050</td> <td align=center>UNKNOWN</td> <td align=center>2.0.1</td> <td align=center>2.0.2</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>aiohttp</td> <td align=center>pyup.io-42692</td> <td align=center>UNKNOWN</td> <td align=center>3.7.4.post0</td> <td align=center>3.8.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>bokeh</td> <td align=center>CVE-2021-41182</td> <td align=center>MEDIUM</td> <td align=center>2.3.3</td> <td align=center>2.4.2</td> <td><details><summary>Expand...</summary><a href=https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/ >https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/</a><br><a href=https://github.com/advisories/GHSA-9gj3-hwp5-pmwc>https://github.com/advisories/GHSA-9gj3-hwp5-pmwc</a><br><a href=https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63>https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63</a><br><a href=https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc>https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41182>https://nvd.nist.gov/vuln/detail/CVE-2021-41182</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0004/ >https://security.netapp.com/advisory/ntap-20211118-0004/</a><br><a href=https://www.drupal.org/sa-contrib-2022-004>https://www.drupal.org/sa-contrib-2022-004</a><br><a href=https://www.drupal.org/sa-core-2022-002>https://www.drupal.org/sa-core-2022-002</a><br></details></td> </tr> <tr> <td align=left>bokeh</td> <td align=center>CVE-2021-41183</td> <td align=center>MEDIUM</td> <td align=center>2.3.3</td> <td align=center>2.4.2</td> <td><details><summary>Expand...</summary><a href=https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/ >https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/</a><br><a href=https://bugs.jqueryui.com/ticket/15284>https://bugs.jqueryui.com/ticket/15284</a><br><a href=https://github.com/advisories/GHSA-j7qv-pgf6-hvh4>https://github.com/advisories/GHSA-j7qv-pgf6-hvh4</a><br><a href=https://github.com/jquery/jquery-ui/pull/1953>https://github.com/jquery/jquery-ui/pull/1953</a><br><a href=https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4>https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41183>https://nvd.nist.gov/vuln/detail/CVE-2021-41183</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0004/ >https://security.netapp.com/advisory/ntap-20211118-0004/</a><br><a href=https://www.drupal.org/sa-contrib-2022-004>https://www.drupal.org/sa-contrib-2022-004</a><br><a href=https://www.drupal.org/sa-core-2022-001>https://www.drupal.org/sa-core-2022-001</a><br><a href=https://www.drupal.org/sa-core-2022-002>https://www.drupal.org/sa-core-2022-002</a><br></details></td> </tr> <tr> <td align=left>bokeh</td> <td align=center>CVE-2021-41184</td> <td align=center>MEDIUM</td> <td align=center>2.3.3</td> <td align=center>2.4.2</td> <td><details><summary>Expand...</summary><a href=https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/ >https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/</a><br><a href=https://github.com/advisories/GHSA-gpqq-952q-5327>https://github.com/advisories/GHSA-gpqq-952q-5327</a><br><a href=https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280>https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280</a><br><a href=https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327>https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41184>https://nvd.nist.gov/vuln/detail/CVE-2021-41184</a><br><a href=https://security.netapp.com/advisory/ntap-20211118-0004/ >https://security.netapp.com/advisory/ntap-20211118-0004/</a><br><a href=https://www.drupal.org/sa-core-2022-001>https://www.drupal.org/sa-core-2022-001</a><br></details></td> </tr> <tr> <td align=left>celery</td> <td align=center>CVE-2021-23727</td> <td align=center>HIGH</td> <td align=center>5.1.1</td> <td align=center>5.2.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-q4xr-rc97-m4xx>https://github.com/advisories/GHSA-q4xr-rc97-m4xx</a><br><a href=https://github.com/celery/celery/blob/master/Changelog.rst%23522>https://github.com/celery/celery/blob/master/Changelog.rst%23522</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-23727>https://nvd.nist.gov/vuln/detail/CVE-2021-23727</a><br><a href=https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953>https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953</a><br></details></td> </tr> <tr> <td align=left>celery</td> <td align=center>pyup.io-42498</td> <td align=center>UNKNOWN</td> <td align=center>5.1.1</td> <td align=center>5.2.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>dask</td> <td align=center>CVE-2021-42343</td> <td align=center>CRITICAL</td> <td align=center>2021.6.2</td> <td align=center>2021.10.0</td> <td><details><summary>Expand...</summary><a href=https://docs.dask.org/en/latest/changelog.html>https://docs.dask.org/en/latest/changelog.html</a><br><a href=https://github.com/advisories/GHSA-j8fq-86c5-5v2r>https://github.com/advisories/GHSA-j8fq-86c5-5v2r</a><br><a href=https://github.com/dask/dask/tags>https://github.com/dask/dask/tags</a><br><a href=https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b>https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b</a><br><a href=https://github.com/dask/distributed/pull/5427>https://github.com/dask/distributed/pull/5427</a><br><a href=https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr>https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-42343>https://nvd.nist.gov/vuln/detail/CVE-2021-42343</a><br></details></td> </tr> <tr> <td align=left>distributed</td> <td align=center>CVE-2021-42343</td> <td align=center>CRITICAL</td> <td align=center>2021.6.2</td> <td align=center>2021.10.0</td> <td><details><summary>Expand...</summary><a href=https://docs.dask.org/en/latest/changelog.html>https://docs.dask.org/en/latest/changelog.html</a><br><a href=https://github.com/advisories/GHSA-j8fq-86c5-5v2r>https://github.com/advisories/GHSA-j8fq-86c5-5v2r</a><br><a href=https://github.com/dask/dask/tags>https://github.com/dask/dask/tags</a><br><a href=https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b>https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b</a><br><a href=https://github.com/dask/distributed/pull/5427>https://github.com/dask/distributed/pull/5427</a><br><a href=https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr>https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-42343>https://nvd.nist.gov/vuln/detail/CVE-2021-42343</a><br></details></td> </tr> <tr> <td align=left>httpie</td> <td align=center>CVE-2022-0430</td> <td align=center>MEDIUM</td> <td align=center>2.4.0</td> <td align=center>3.1.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6pc9-xqrg-wfqw>https://github.com/advisories/GHSA-6pc9-xqrg-wfqw</a><br><a href=https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b>https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b</a><br><a href=https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f>https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-0430>https://nvd.nist.gov/vuln/detail/CVE-2022-0430</a><br></details></td> </tr> <tr> <td align=left>httpie</td> <td align=center>CVE-2022-24737</td> <td align=center>MEDIUM</td> <td align=center>2.4.0</td> <td align=center>3.1.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9w4w-cpc8-h2fq>https://github.com/advisories/GHSA-9w4w-cpc8-h2fq</a><br><a href=https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b>https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b</a><br><a href=https://github.com/httpie/httpie/releases/tag/3.1.0>https://github.com/httpie/httpie/releases/tag/3.1.0</a><br><a href=https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq>https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXFCHGTW3V32GD6GXXJZE5QAOSDT3RTY/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXFCHGTW3V32GD6GXXJZE5QAOSDT3RTY/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-24737>https://nvd.nist.gov/vuln/detail/CVE-2022-24737</a><br></details></td> </tr> <tr> <td align=left>ipython</td> <td align=center>CVE-2022-21699</td> <td align=center>HIGH</td> <td align=center>7.24.1</td> <td align=center>8.0.1, 7.31.1, 7.16.3, 5.11</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-pq7m-3gw7-gq5x>https://github.com/advisories/GHSA-pq7m-3gw7-gq5x</a><br><a href=https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668>https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668</a><br><a href=https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x>https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x</a><br><a href=https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699>https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html>https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21699>https://nvd.nist.gov/vuln/detail/CVE-2022-21699</a><br></details></td> </tr> <tr> <td align=left>jupyter-server</td> <td align=center>pyup.io-41065</td> <td align=center>UNKNOWN</td> <td align=center>1.9.0</td> <td align=center>1.10.2</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>jupyter-server</td> <td align=center>pyup.io-42779</td> <td align=center>UNKNOWN</td> <td align=center>1.9.0</td> <td align=center>1.12.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>jupyter-server-proxy</td> <td align=center>CVE-2022-21697</td> <td align=center>HIGH</td> <td align=center>3.0.2</td> <td align=center>3.2.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gcv9-6737-pjqw>https://github.com/advisories/GHSA-gcv9-6737-pjqw</a><br><a href=https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb>https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb</a><br><a href=https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch>https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch</a><br><a href=https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw>https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21697>https://nvd.nist.gov/vuln/detail/CVE-2022-21697</a><br></details></td> </tr> <tr> <td align=left>jupyterhub</td> <td align=center>CVE-2021-41247</td> <td align=center>HIGH</td> <td align=center>1.4.1</td> <td align=center>1.5.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cw7p-q79f-m2v7>https://github.com/advisories/GHSA-cw7p-q79f-m2v7</a><br><a href=https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27>https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27</a><br><a href=https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7>https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41247>https://nvd.nist.gov/vuln/detail/CVE-2021-41247</a><br></details></td> </tr> <tr> <td align=left>jupyterlab</td> <td align=center>CVE-2021-32797</td> <td align=center>CRITICAL</td> <td align=center>3.0.16</td> <td align=center>3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4952-p58q-6crx>https://github.com/advisories/GHSA-4952-p58q-6crx</a><br><a href=https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx>https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx</a><br><a href=https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed>https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed</a><br><a href=https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx>https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-32797>https://nvd.nist.gov/vuln/detail/CVE-2021-32797</a><br></details></td> </tr> <tr> <td align=left>jupyterlab</td> <td align=center>pyup.io-40969</td> <td align=center>UNKNOWN</td> <td align=center>3.0.16</td> <td align=center>3.1.0b2</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>jupyterlab</td> <td align=center>pyup.io-41038</td> <td align=center>UNKNOWN</td> <td align=center>3.0.16</td> <td align=center>3.1.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>jupyterlab-git</td> <td align=center>pyup.io-41073</td> <td align=center>UNKNOWN</td> <td align=center>0.30.1</td> <td align=center>0.32.0</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>jupytext</td> <td align=center>CVE-2021-3807</td> <td align=center>HIGH</td> <td align=center>1.11.3</td> <td align=center>1.13.0</td> <td><details><summary>Expand...</summary><a href=https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908>https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href=https://github.com/advisories/GHSA-93q8-gq69-wqmw>https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href=https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9>https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href=https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311>https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href=https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774>https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href=https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994>https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href=https://linux.oracle.com/cve/CVE-2021-3807.html>https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2022-0350.html>https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-3807>https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br></details></td> </tr> <tr> <td align=left>jupytext</td> <td align=center>pyup.io-41249</td> <td align=center>UNKNOWN</td> <td align=center>1.11.3</td> <td align=center>1.11.5</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>kombu</td> <td align=center>pyup.io-42497</td> <td align=center>UNKNOWN</td> <td align=center>5.1.0</td> <td align=center>5.2.1</td> <td><details><summary>Expand...</summary></details></td> </tr> <tr> <td align=left>lxml</td> <td align=center>CVE-2021-43818</td> <td align=center>HIGH</td> <td align=center>4.6.3</td> <td align=center>4.6.5</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818</a><br><a href=https://github.com/advisories/GHSA-55x5-fj6c-h6m8>https://github.com/advisories/GHSA-55x5-fj6c-h6m8</a><br><a href=https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt>https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt</a><br><a href=https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a>https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a</a><br><a href="https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a (lxml-4.6.5)">https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a (lxml-4.6.5)</a><br><a href=https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776>https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776</a><br><a href=https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0>https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0</a><br><a href="https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 (lxml-4.6.5)">https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 (lxml-4.6.5)</a><br><a href=https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8>https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html>https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-43818>https://nvd.nist.gov/vuln/detail/CVE-2021-43818</a><br><a href=https://security.netapp.com/advisory/ntap-20220107-0005/ >https://security.netapp.com/advisory/ntap-20220107-0005/</a><br><a href=https://ubuntu.com/security/notices/USN-5225-1>https://ubuntu.com/security/notices/USN-5225-1</a><br><a href=https://www.debian.org/security/2022/dsa-5043>https://www.debian.org/security/2022/dsa-5043</a><br></details></td> </tr> <tr> <td align=left>mlflow</td> <td align=center>CVE-2022-0736</td> <td align=center>HIGH</td> <td align=center>1.18.0</td> <td align=center>1.23.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-vqj2-4v8m-8vrq>https://github.com/advisories/GHSA-vqj2-4v8m-8vrq</a><br><a href=https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711>https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711</a><br><a href=https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75>https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-0736>https://nvd.nist.gov/vuln/detail/CVE-2022-0736</a><br></details></td> </tr> <tr> <td align=left>nbdime</td> <td align=center>CVE-2021-41134</td> <td align=center>MEDIUM</td> <td align=center>3.1.0</td> <td align=center>3.1.1, 2.1.1, 1.1.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-p6rw-44q7-3fw4>https://github.com/advisories/GHSA-p6rw-44q7-3fw4</a><br><a href=https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea>https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea</a><br><a href=https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4>https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41134>https://nvd.nist.gov/vuln/detail/CVE-2021-41134</a><br></details></td> </tr> <tr> <td align=left>nltk</td> <td align=center>CVE-2021-3828</td> <td align=center>HIGH</td> <td align=center>3.6.2</td> <td align=center>3.6.4</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3828">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3828</a><br><a href=https://github.com/advisories/GHSA-2ww3-fxvq-293j>https://github.com/advisories/GHSA-2ww3-fxvq-293j</a><br><a href=https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6>https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6</a><br><a href=https://github.com/nltk/nltk/pull/2816>https://github.com/nltk/nltk/pull/2816</a><br><a href=https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32>https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-3828>https://nvd.nist.gov/vuln/detail/CVE-2021-3828</a><br></details></td> </tr> <tr> <td align=left>nltk</td> <td align=center>CVE-2021-3842</td> <td align=center>HIGH</td> <td align=center>3.6.2</td> <td align=center>3.6.6</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-rqjh-jp2r-59cj>https://github.com/advisories/GHSA-rqjh-jp2r-59cj</a><br><a href=https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d>https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d</a><br><a href=https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a>https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-3842>https://nvd.nist.gov/vuln/detail/CVE-2021-3842</a><br></details></td> </tr> <tr> <td align=left>nltk</td> <td align=center>CVE-2021-43854</td> <td align=center>HIGH</td> <td align=center>3.6.2</td> <td align=center>3.6.5</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-f8m6-h2c7-8h9x>https://github.com/advisories/GHSA-f8m6-h2c7-8h9x</a><br><a href=https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341>https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341</a><br><a href=https://github.com/nltk/nltk/issues/2866>https://github.com/nltk/nltk/issues/2866</a><br><a href=https://github.com/nltk/nltk/pull/2869>https://github.com/nltk/nltk/pull/2869</a><br><a href=https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x>https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-43854>https://nvd.nist.gov/vuln/detail/CVE-2021-43854</a><br></details></td> </tr> <tr> <td align=left>notebook</td> <td align=center>CVE-2021-32797</td> <td align=center>CRITICAL</td> <td align=center>6.4.0</td> <td align=center>6.4.1, 5.7.11</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4952-p58q-6crx>https://github.com/advisories/GHSA-4952-p58q-6crx</a><br><a href=https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx>https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx</a><br><a href=https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed>https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed</a><br><a href=https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx>https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-32797>https://nvd.nist.gov/vuln/detail/CVE-2021-32797</a><br></details></td> </tr> <tr> <td align=left>notebook</td> <td align=center>CVE-2021-32798</td> <td align=center>CRITICAL</td> <td align=center>6.4.0</td> <td align=center>6.4.1, 5.7.11</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-hwvq-6gjx-j797>https://github.com/advisories/GHSA-hwvq-6gjx-j797</a><br><a href=https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5>https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5</a><br><a href=https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797>https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-32798>https://nvd.nist.gov/vuln/detail/CVE-2021-32798</a><br></details></td> </tr> <tr> <td align=left>numpy</td> <td align=center>CVE-2021-33430</td> <td align=center>HIGH</td> <td align=center>1.19.5</td> <td align=center>1.21.0rc1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6p56-wp2h-9hxr>https://github.com/advisories/GHSA-6p56-wp2h-9hxr</a><br><a href=https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e>https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e</a><br><a href=https://github.com/numpy/numpy/issues/18939>https://github.com/numpy/numpy/issues/18939</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-33430>https://nvd.nist.gov/vuln/detail/CVE-2021-33430</a><br></details></td> </tr> <tr> <td align=left>numpy</td> <td align=center>CVE-2021-41495</td> <td align=center>HIGH</td> <td align=center>1.19.5</td> <td align=center>1.22.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/numpy/numpy/issues/19038>https://github.com/numpy/numpy/issues/19038</a><br></details></td> </tr> <tr> <td align=left>numpy</td> <td align=center>CVE-2021-41496</td> <td align=center>HIGH</td> <td align=center>1.19.5</td> <td align=center>1.22.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/numpy/numpy/issues/19000>https://github.com/numpy/numpy/issues/19000</a><br></details></td> </tr> <tr> <td align=left>numpy</td> <td align=center>CVE-2021-34141</td> <td align=center>MEDIUM</td> <td align=center>1.19.5</td> <td align=center>1.22.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/numpy/numpy/issues/18993>https://github.com/numpy/numpy/issues/18993</a><br></details></td> </tr> <tr> <td align=left>pipenv</td> <td align=center>CVE-2022-21668</td> <td align=center>HIGH</td> <td align=center>2021.5.29</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-qc9x-gjcv-465w>https://github.com/advisories/GHSA-qc9x-gjcv-465w</a><br><a href=https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f>https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f</a><br><a href=https://github.com/pypa/pipenv/releases/tag/v2022.1.8>https://github.com/pypa/pipenv/releases/tag/v2022.1.8</a><br><a href=https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w>https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56HBA3EOSLEDNCCBJVHE6DO34P56EOUM/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56HBA3EOSLEDNCCBJVHE6DO34P56EOUM/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KCROBYHUS6DKQPCXBRPCZ5CDBNQTYAWT/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KCROBYHUS6DKQPCXBRPCZ5CDBNQTYAWT/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHQRIWKDP3SVJABAPEXBIQPKDI6UP7G4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHQRIWKDP3SVJABAPEXBIQPKDI6UP7G4/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21668>https://nvd.nist.gov/vuln/detail/CVE-2022-21668</a><br></details></td> </tr> <tr> <td align=left>sqlparse</td> <td align=center>CVE-2021-32839</td> <td align=center>HIGH</td> <td align=center>0.4.1</td> <td align=center>0.4.2</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32839">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32839</a><br><a href=https://github.com/advisories/GHSA-p5w8-wqhj-9hhf>https://github.com/advisories/GHSA-p5w8-wqhj-9hhf</a><br><a href=https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb>https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb</a><br><a href=https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf>https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-32839>https://nvd.nist.gov/vuln/detail/CVE-2021-32839</a><br><a href=https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/ >https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/</a><br><a href=https://ubuntu.com/security/notices/USN-5085-1>https://ubuntu.com/security/notices/USN-5085-1</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23587</td> <td align=center>CRITICAL</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-8jj7-5vxc-pg2q>https://github.com/advisories/GHSA-8jj7-5vxc-pg2q</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689</a><br><a href=https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f>https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23587>https://nvd.nist.gov/vuln/detail/CVE-2022-23587</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>GHSA-h6gw-r52c-724r</td> <td align=center>CRITICAL</td> <td align=center>2.5.0</td> <td align=center>2.7.1, 2.6.3, 2.5.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-h6gw-r52c-724r>https://github.com/advisories/GHSA-h6gw-r52c-724r</a><br><a href=https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc>https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2020-10531</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1</td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html>http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html</a><br><a href=https://access.redhat.com/errata/RHSA-2020:0738>https://access.redhat.com/errata/RHSA-2020:0738</a><br><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1044570">https://bugs.chromium.org/p/chromium/issues/detail?id=1044570</a><br><a href=https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html>https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html</a><br><a href=https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08>https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531</a><br><a href=https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca>https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca</a><br><a href=https://github.com/unicode-org/icu/pull/971>https://github.com/unicode-org/icu/pull/971</a><br><a href=https://linux.oracle.com/cve/CVE-2020-10531.html>https://linux.oracle.com/cve/CVE-2020-10531.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-1317.html>https://linux.oracle.com/errata/ELSA-2020-1317.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/03/msg00024.html>https://lists.debian.org/debian-lts-announce/2020/03/msg00024.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/</a><br><a href=https://security.gentoo.org/glsa/202003-15>https://security.gentoo.org/glsa/202003-15</a><br><a href=https://ubuntu.com/security/notices/USN-4305-1>https://ubuntu.com/security/notices/USN-4305-1</a><br><a href=https://unicode-org.atlassian.net/browse/ICU-20958>https://unicode-org.atlassian.net/browse/ICU-20958</a><br><a href=https://usn.ubuntu.com/4305-1/ >https://usn.ubuntu.com/4305-1/</a><br><a href=https://www.debian.org/security/2020/dsa-4646>https://www.debian.org/security/2020/dsa-4646</a><br><a href=https://www.oracle.com/security-alerts/cpujan2021.html>https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22901</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22901.html>https://curl.se/docs/CVE-2021-22901.html</a><br><a href=https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479>https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479</a><br><a href=https://hackerone.com/reports/1180380>https://hackerone.com/reports/1180380</a><br><a href=https://security.netapp.com/advisory/ntap-20210723-0001/ >https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href=https://security.netapp.com/advisory/ntap-20210727-0007/ >https://security.netapp.com/advisory/ntap-20210727-0007/</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22926</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22926.html>https://curl.se/docs/CVE-2021-22926.html</a><br><a href=https://hackerone.com/reports/1234760>https://hackerone.com/reports/1234760</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://security.netapp.com/advisory/ntap-20211022-0003/ >https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37635</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cgfm-62j4-v4rf>https://github.com/advisories/GHSA-cgfm-62j4-v4rf</a><br><a href=https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750>https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37635>https://nvd.nist.gov/vuln/detail/CVE-2021-37635</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37638</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-hwr7-8gxx-fj5p>https://github.com/advisories/GHSA-hwr7-8gxx-fj5p</a><br><a href=https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314>https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37638>https://nvd.nist.gov/vuln/detail/CVE-2021-37638</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37639</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gh6x-4whr-2qv4>https://github.com/advisories/GHSA-gh6x-4whr-2qv4</a><br><a href=https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622>https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37639>https://nvd.nist.gov/vuln/detail/CVE-2021-37639</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37641</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9c8h-vvrj-w2p8>https://github.com/advisories/GHSA-9c8h-vvrj-w2p8</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373>https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37641>https://nvd.nist.gov/vuln/detail/CVE-2021-37641</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37643</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-fcwc-p4fc-c5cc>https://github.com/advisories/GHSA-fcwc-p4fc-c5cc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988>https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37643>https://nvd.nist.gov/vuln/detail/CVE-2021-37643</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37648</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-wp77-4gmm-7cq8>https://github.com/advisories/GHSA-wp77-4gmm-7cq8</a><br><a href=https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986>https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37648>https://nvd.nist.gov/vuln/detail/CVE-2021-37648</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37650</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-f8h4-7rgh-q2gm>https://github.com/advisories/GHSA-f8h4-7rgh-q2gm</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876>https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37650>https://nvd.nist.gov/vuln/detail/CVE-2021-37650</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37651</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-hpv4-7p9c-mvfr>https://github.com/advisories/GHSA-hpv4-7p9c-mvfr</a><br><a href=https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30>https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37651>https://nvd.nist.gov/vuln/detail/CVE-2021-37651</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37652</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-m7fm-4jfh-jrg6>https://github.com/advisories/GHSA-m7fm-4jfh-jrg6</a><br><a href=https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab>https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37652>https://nvd.nist.gov/vuln/detail/CVE-2021-37652</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37654</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-2r8p-fg3c-wcj4>https://github.com/advisories/GHSA-2r8p-fg3c-wcj4</a><br><a href=https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d>https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37654>https://nvd.nist.gov/vuln/detail/CVE-2021-37654</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37655</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-7fvx-3jfc-2cpc>https://github.com/advisories/GHSA-7fvx-3jfc-2cpc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f>https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37655>https://nvd.nist.gov/vuln/detail/CVE-2021-37655</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37656</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4xfp-4pfp-89wg>https://github.com/advisories/GHSA-4xfp-4pfp-89wg</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece>https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37656>https://nvd.nist.gov/vuln/detail/CVE-2021-37656</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37657</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-5xwc-mrhx-5g3m>https://github.com/advisories/GHSA-5xwc-mrhx-5g3m</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09>https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37657>https://nvd.nist.gov/vuln/detail/CVE-2021-37657</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37658</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6p5r-g9mq-ggh2>https://github.com/advisories/GHSA-6p5r-g9mq-ggh2</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b>https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37658>https://nvd.nist.gov/vuln/detail/CVE-2021-37658</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37659</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-q3g3-h9r4-prrc>https://github.com/advisories/GHSA-q3g3-h9r4-prrc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec>https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37659>https://nvd.nist.gov/vuln/detail/CVE-2021-37659</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37662</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-f5cx-5wr3-5qrc>https://github.com/advisories/GHSA-f5cx-5wr3-5qrc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7>https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7</a><br><a href=https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad>https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37662>https://nvd.nist.gov/vuln/detail/CVE-2021-37662</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37663</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-g25h-jr74-qp5j>https://github.com/advisories/GHSA-g25h-jr74-qp5j</a><br><a href=https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708>https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37663>https://nvd.nist.gov/vuln/detail/CVE-2021-37663</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37664</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-r4c4-5fpq-56wg>https://github.com/advisories/GHSA-r4c4-5fpq-56wg</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378>https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37664>https://nvd.nist.gov/vuln/detail/CVE-2021-37664</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37665</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-v82p-hv3v-p6qp>https://github.com/advisories/GHSA-v82p-hv3v-p6qp</a><br><a href=https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9>https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9</a><br><a href=https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69>https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37665>https://nvd.nist.gov/vuln/detail/CVE-2021-37665</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37666</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-w4xf-2pqw-5mq7>https://github.com/advisories/GHSA-w4xf-2pqw-5mq7</a><br><a href=https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612>https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37666>https://nvd.nist.gov/vuln/detail/CVE-2021-37666</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37667</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-w74j-v8xh-3w5h>https://github.com/advisories/GHSA-w74j-v8xh-3w5h</a><br><a href=https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6>https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37667>https://nvd.nist.gov/vuln/detail/CVE-2021-37667</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37671</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-qr82-2c78-4m8h>https://github.com/advisories/GHSA-qr82-2c78-4m8h</a><br><a href=https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac>https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37671>https://nvd.nist.gov/vuln/detail/CVE-2021-37671</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37676</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-v768-w7m9-2vmm>https://github.com/advisories/GHSA-v768-w7m9-2vmm</a><br><a href=https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed>https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37676>https://nvd.nist.gov/vuln/detail/CVE-2021-37676</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37678</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4, 2.7.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-r6jx-9g48-2r5r>https://github.com/advisories/GHSA-r6jx-9g48-2r5r</a><br><a href=https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012>https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37678>https://nvd.nist.gov/vuln/detail/CVE-2021-37678</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37679</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-g8wg-cjwc-xhhp>https://github.com/advisories/GHSA-g8wg-cjwc-xhhp</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12>https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37679>https://nvd.nist.gov/vuln/detail/CVE-2021-37679</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37681</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-7xwj-5r4v-429p>https://github.com/advisories/GHSA-7xwj-5r4v-429p</a><br><a href=https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76>https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37681>https://nvd.nist.gov/vuln/detail/CVE-2021-37681</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37682</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.4.3, 2.3.4, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4c4g-crqm-xrxw>https://github.com/advisories/GHSA-4c4g-crqm-xrxw</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5>https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5</a><br><a href=https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887>https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538>https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37682>https://nvd.nist.gov/vuln/detail/CVE-2021-37682</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41201</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-j86v-p27c-73fm>https://github.com/advisories/GHSA-j86v-p27c-73fm</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6>https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41201>https://nvd.nist.gov/vuln/detail/CVE-2021-41201</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41203</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-7pxj-m4jf-r6h2>https://github.com/advisories/GHSA-7pxj-m4jf-r6h2</a><br><a href=https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec>https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec</a><br><a href=https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578>https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578</a><br><a href=https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad>https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2>https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41203>https://nvd.nist.gov/vuln/detail/CVE-2021-41203</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41205</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-49rx-x2rw-pc6f>https://github.com/advisories/GHSA-49rx-x2rw-pc6f</a><br><a href=https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d>https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41205>https://nvd.nist.gov/vuln/detail/CVE-2021-41205</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41206</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-pgcq-h79j-2f69>https://github.com/advisories/GHSA-pgcq-h79j-2f69</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4>https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07>https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07</a><br><a href=https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d>https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d</a><br><a href=https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a>https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a</a><br><a href=https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261>https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904>https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41206>https://nvd.nist.gov/vuln/detail/CVE-2021-41206</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41208</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-57wx-m983-2f88>https://github.com/advisories/GHSA-57wx-m983-2f88</a><br><a href=https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c>https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41208>https://nvd.nist.gov/vuln/detail/CVE-2021-41208</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41210</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-m342-ff57-4jcc>https://github.com/advisories/GHSA-m342-ff57-4jcc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2>https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41210>https://nvd.nist.gov/vuln/detail/CVE-2021-41210</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41212</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-fr77-rrx3-cp7g>https://github.com/advisories/GHSA-fr77-rrx3-cp7g</a><br><a href=https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8>https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41212>https://nvd.nist.gov/vuln/detail/CVE-2021-41212</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41214</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-vwhq-49r4-gj9v>https://github.com/advisories/GHSA-vwhq-49r4-gj9v</a><br><a href=https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8>https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41214>https://nvd.nist.gov/vuln/detail/CVE-2021-41214</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41216</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-3ff2-r28g-w7h9>https://github.com/advisories/GHSA-3ff2-r28g-w7h9</a><br><a href=https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185>https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185</a><br><a href=https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14>https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41216>https://nvd.nist.gov/vuln/detail/CVE-2021-41216</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41219</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4f99-p9c2-3j8x>https://github.com/advisories/GHSA-4f99-p9c2-3j8x</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae>https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41219>https://nvd.nist.gov/vuln/detail/CVE-2021-41219</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41221</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cqv6-3phm-hcwx>https://github.com/advisories/GHSA-cqv6-3phm-hcwx</a><br><a href=https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6>https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41221>https://nvd.nist.gov/vuln/detail/CVE-2021-41221</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41223</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-f54p-f6jp-4rhr>https://github.com/advisories/GHSA-f54p-f6jp-4rhr</a><br><a href=https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda>https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41223>https://nvd.nist.gov/vuln/detail/CVE-2021-41223</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41224</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-rg3m-hqc5-344v>https://github.com/advisories/GHSA-rg3m-hqc5-344v</a><br><a href=https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b>https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41224>https://nvd.nist.gov/vuln/detail/CVE-2021-41224</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41225</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-7r94-xv9v-63jw>https://github.com/advisories/GHSA-7r94-xv9v-63jw</a><br><a href=https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3>https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41225>https://nvd.nist.gov/vuln/detail/CVE-2021-41225</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41226</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-374m-jm66-3vj8>https://github.com/advisories/GHSA-374m-jm66-3vj8</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba>https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41226>https://nvd.nist.gov/vuln/detail/CVE-2021-41226</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41228</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-3rcw-9p9x-582v>https://github.com/advisories/GHSA-3rcw-9p9x-582v</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7>https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41228>https://nvd.nist.gov/vuln/detail/CVE-2021-41228</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21726</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-23hm-7w47-xw72>https://github.com/advisories/GHSA-23hm-7w47-xw72</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153</a><br><a href=https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943>https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21726>https://nvd.nist.gov/vuln/detail/CVE-2022-21726</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21727</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-c6fh-56w7-fvjw>https://github.com/advisories/GHSA-c6fh-56w7-fvjw</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034</a><br><a href=https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b>https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21727>https://nvd.nist.gov/vuln/detail/CVE-2022-21727</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21728</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6gmv-pjp9-p8w8>https://github.com/advisories/GHSA-6gmv-pjp9-p8w8</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671</a><br><a href=https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995>https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21728>https://nvd.nist.gov/vuln/detail/CVE-2022-21728</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21730</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-vjg4-v33c-ggc4>https://github.com/advisories/GHSA-vjg4-v33c-ggc4</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360</a><br><a href=https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9>https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21730>https://nvd.nist.gov/vuln/detail/CVE-2022-21730</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21740</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-44qp-9wwf-734r>https://github.com/advisories/GHSA-44qp-9wwf-734r</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273</a><br><a href=https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a>https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a</a><br><a href=https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3>https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21740>https://nvd.nist.gov/vuln/detail/CVE-2022-21740</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23558</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9gwq-6cwj-47h3>https://github.com/advisories/GHSA-9gwq-6cwj-47h3</a><br><a href=https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33>https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33</a><br><a href=https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60>https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091>https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23558>https://nvd.nist.gov/vuln/detail/CVE-2022-23558</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23559</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-98p5-x8x4-c9m5>https://github.com/advisories/GHSA-98p5-x8x4-c9m5</a><br><a href=https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189>https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043>https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4>https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01>https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23559>https://nvd.nist.gov/vuln/detail/CVE-2022-23559</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23560</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4hvf-hxvg-f67v>https://github.com/advisories/GHSA-4hvf-hxvg-f67v</a><br><a href=https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293>https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293</a><br><a href=https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038>https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23560>https://nvd.nist.gov/vuln/detail/CVE-2022-23560</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23561</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9c78-vcq7-7vxq>https://github.com/advisories/GHSA-9c78-vcq7-7vxq</a><br><a href=https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6>https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23561>https://nvd.nist.gov/vuln/detail/CVE-2022-23561</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23562</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-qx3f-p745-w4hr>https://github.com/advisories/GHSA-qx3f-p745-w4hr</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732>https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732</a><br><a href=https://github.com/tensorflow/tensorflow/issues/52676>https://github.com/tensorflow/tensorflow/issues/52676</a><br><a href=https://github.com/tensorflow/tensorflow/pull/51733>https://github.com/tensorflow/tensorflow/pull/51733</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23562>https://nvd.nist.gov/vuln/detail/CVE-2022-23562</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23566</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-5qw5-89mw-wcg2>https://github.com/advisories/GHSA-5qw5-89mw-wcg2</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141</a><br><a href=https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd>https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23566>https://nvd.nist.gov/vuln/detail/CVE-2022-23566</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23573</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-q85f-69q7-55h2>https://github.com/advisories/GHSA-q85f-69q7-55h2</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b>https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23573>https://nvd.nist.gov/vuln/detail/CVE-2022-23573</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23574</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-77gp-3h4r-6428>https://github.com/advisories/GHSA-77gp-3h4r-6428</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102</a><br><a href=https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042>https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23574>https://nvd.nist.gov/vuln/detail/CVE-2022-23574</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23591</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-247x-2f9f-5wp7>https://github.com/advisories/GHSA-247x-2f9f-5wp7</a><br><a href=https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c>https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23591>https://nvd.nist.gov/vuln/detail/CVE-2022-23591</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>GHSA-43q8-3fv7-pr5x</td> <td align=center>HIGH</td> <td align=center>2.5.0</td> <td align=center>2.7.1, 2.6.3, 2.5.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-43q8-3fv7-pr5x>https://github.com/advisories/GHSA-43q8-3fv7-pr5x</a><br><a href=https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5>https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5</a><br><a href=https://github.com/tensorflow/tensorflow/pull/53695>https://github.com/tensorflow/tensorflow/pull/53695</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22876</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22876.html>https://curl.se/docs/CVE-2021-22876.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876</a><br><a href=https://hackerone.com/reports/1101882>https://hackerone.com/reports/1101882</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22876.html>https://linux.oracle.com/cve/CVE-2021-22876.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html>https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/</a><br><a href=https://security.gentoo.org/glsa/202105-36>https://security.gentoo.org/glsa/202105-36</a><br><a href=https://security.netapp.com/advisory/ntap-20210521-0007/ >https://security.netapp.com/advisory/ntap-20210521-0007/</a><br><a href=https://ubuntu.com/security/notices/USN-4898-1>https://ubuntu.com/security/notices/USN-4898-1</a><br><a href=https://ubuntu.com/security/notices/USN-4903-1>https://ubuntu.com/security/notices/USN-4903-1</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22897</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22897.html>https://curl.se/docs/CVE-2021-22897.html</a><br><a href=https://github.com/curl/curl/commit/bbb71507b7bab52002f9b1e0880bed6a32834511>https://github.com/curl/curl/commit/bbb71507b7bab52002f9b1e0880bed6a32834511</a><br><a href=https://hackerone.com/reports/1172857>https://hackerone.com/reports/1172857</a><br><a href=https://security.netapp.com/advisory/ntap-20210727-0007/ >https://security.netapp.com/advisory/ntap-20210727-0007/</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22922</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22922.html>https://curl.se/docs/CVE-2021-22922.html</a><br><a href=https://hackerone.com/reports/1213175>https://hackerone.com/reports/1213175</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22922.html>https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3582.html>https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22923</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22923.html>https://curl.se/docs/CVE-2021-22923.html</a><br><a href=https://hackerone.com/reports/1213181>https://hackerone.com/reports/1213181</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22923.html>https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3582.html>https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22925</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=http://seclists.org/fulldisclosure/2021/Sep/39>http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href=http://seclists.org/fulldisclosure/2021/Sep/40>http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22925.html>https://curl.se/docs/CVE-2021-22925.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925</a><br><a href=https://hackerone.com/reports/1223882>https://hackerone.com/reports/1223882</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22925.html>https://linux.oracle.com/cve/CVE-2021-22925.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://support.apple.com/kb/HT212804>https://support.apple.com/kb/HT212804</a><br><a href=https://support.apple.com/kb/HT212805>https://support.apple.com/kb/HT212805</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37636</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-hp4c-x6r7-6555>https://github.com/advisories/GHSA-hp4c-x6r7-6555</a><br><a href=https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9>https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37636>https://nvd.nist.gov/vuln/detail/CVE-2021-37636</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37637</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-c9qf-r67m-p7cg>https://github.com/advisories/GHSA-c9qf-r67m-p7cg</a><br><a href=https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5>https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37637>https://nvd.nist.gov/vuln/detail/CVE-2021-37637</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37640</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-95xm-g58g-3p88>https://github.com/advisories/GHSA-95xm-g58g-3p88</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41>https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37640>https://nvd.nist.gov/vuln/detail/CVE-2021-37640</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37642</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-ch4f-829c-v5pw>https://github.com/advisories/GHSA-ch4f-829c-v5pw</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76>https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37642>https://nvd.nist.gov/vuln/detail/CVE-2021-37642</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37644</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-27j5-4p9v-pp67>https://github.com/advisories/GHSA-27j5-4p9v-pp67</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2>https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37644>https://nvd.nist.gov/vuln/detail/CVE-2021-37644</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37645</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.1, 2.4.3, 2.3.4, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9w2p-5mgw-p94c>https://github.com/advisories/GHSA-9w2p-5mgw-p94c</a><br><a href=https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1>https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37645>https://nvd.nist.gov/vuln/detail/CVE-2021-37645</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37646</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-h6jh-7gv5-28vg>https://github.com/advisories/GHSA-h6jh-7gv5-28vg</a><br><a href=https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5>https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37646>https://nvd.nist.gov/vuln/detail/CVE-2021-37646</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37647</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-c5x2-p679-95wc>https://github.com/advisories/GHSA-c5x2-p679-95wc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7>https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37647>https://nvd.nist.gov/vuln/detail/CVE-2021-37647</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37649</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.5.1, 2.4.3, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6gv8-p3vj-pxvr>https://github.com/advisories/GHSA-6gv8-p3vj-pxvr</a><br><a href=https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd>https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37649>https://nvd.nist.gov/vuln/detail/CVE-2021-37649</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37653</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-qjj8-32p7-h289>https://github.com/advisories/GHSA-qjj8-32p7-h289</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11>https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37653>https://nvd.nist.gov/vuln/detail/CVE-2021-37653</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37660</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cm5x-837x-jf3c>https://github.com/advisories/GHSA-cm5x-837x-jf3c</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618>https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37660>https://nvd.nist.gov/vuln/detail/CVE-2021-37660</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37661</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gf88-j2mg-cc82>https://github.com/advisories/GHSA-gf88-j2mg-cc82</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992>https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37661>https://nvd.nist.gov/vuln/detail/CVE-2021-37661</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37668</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-2wmv-37vq-52g5>https://github.com/advisories/GHSA-2wmv-37vq-52g5</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233>https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37668>https://nvd.nist.gov/vuln/detail/CVE-2021-37668</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37669</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-vmjw-c2vp-p33c>https://github.com/advisories/GHSA-vmjw-c2vp-p33c</a><br><a href=https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d>https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d</a><br><a href=https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58>https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37669>https://nvd.nist.gov/vuln/detail/CVE-2021-37669</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37670</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9697-98pf-4rw7>https://github.com/advisories/GHSA-9697-98pf-4rw7</a><br><a href=https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38>https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37670>https://nvd.nist.gov/vuln/detail/CVE-2021-37670</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37672</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-5hj3-vjjf-f5m7>https://github.com/advisories/GHSA-5hj3-vjjf-f5m7</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6>https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37672>https://nvd.nist.gov/vuln/detail/CVE-2021-37672</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37673</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-278g-rq84-9hmg>https://github.com/advisories/GHSA-278g-rq84-9hmg</a><br><a href=https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d>https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37673>https://nvd.nist.gov/vuln/detail/CVE-2021-37673</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37674</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-7ghq-fvr3-pj2x>https://github.com/advisories/GHSA-7ghq-fvr3-pj2x</a><br><a href=https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md>https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md</a><br><a href=https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475>https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37674>https://nvd.nist.gov/vuln/detail/CVE-2021-37674</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37675</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9c8h-2mv3-49ww>https://github.com/advisories/GHSA-9c8h-2mv3-49ww</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4>https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37675>https://nvd.nist.gov/vuln/detail/CVE-2021-37675</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37677</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-qfpc-5pjr-mh26>https://github.com/advisories/GHSA-qfpc-5pjr-mh26</a><br><a href=https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764>https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37677>https://nvd.nist.gov/vuln/detail/CVE-2021-37677</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37680</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cfpj-3q4c-jhvr>https://github.com/advisories/GHSA-cfpj-3q4c-jhvr</a><br><a href=https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f>https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37680>https://nvd.nist.gov/vuln/detail/CVE-2021-37680</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37683</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-rhrq-64mq-hf9h>https://github.com/advisories/GHSA-rhrq-64mq-hf9h</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28>https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37683>https://nvd.nist.gov/vuln/detail/CVE-2021-37683</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37684</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.5.1, 2.4.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-q7f7-544h-67h9>https://github.com/advisories/GHSA-q7f7-544h-67h9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37684>https://nvd.nist.gov/vuln/detail/CVE-2021-37684</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37685</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-c545-c4f9-rf6v>https://github.com/advisories/GHSA-c545-c4f9-rf6v</a><br><a href=https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257>https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37685>https://nvd.nist.gov/vuln/detail/CVE-2021-37685</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37686</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4rc0, 2.4.3rc0, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-mhhc-q96p-mfm9>https://github.com/advisories/GHSA-mhhc-q96p-mfm9</a><br><a href=https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695>https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695</a><br><a href=https://github.com/tensorflow/tensorflow/releases/tag/v2.3.4>https://github.com/tensorflow/tensorflow/releases/tag/v2.3.4</a><br><a href=https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3>https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3</a><br><a href=https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1>https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1</a><br><a href=https://github.com/tensorflow/tensorflow/releases/tag/v2.6.0>https://github.com/tensorflow/tensorflow/releases/tag/v2.6.0</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37686>https://nvd.nist.gov/vuln/detail/CVE-2021-37686</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37687</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.3.4, 2.4.3, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-jwf9-w5xm-f437>https://github.com/advisories/GHSA-jwf9-w5xm-f437</a><br><a href=https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f>https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f</a><br><a href=https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d>https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37687>https://nvd.nist.gov/vuln/detail/CVE-2021-37687</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37688</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.1, 2.4.3, 2.3.4, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-vcjj-9vg7-vf68>https://github.com/advisories/GHSA-vcjj-9vg7-vf68</a><br><a href=https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c>https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37688>https://nvd.nist.gov/vuln/detail/CVE-2021-37688</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37689</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.3.4, 2.4.3, 2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-wf5p-c75w-w3wh>https://github.com/advisories/GHSA-wf5p-c75w-w3wh</a><br><a href=https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955>https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37689>https://nvd.nist.gov/vuln/detail/CVE-2021-37689</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37690</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.4.3, 2.3.4, 2.5.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-3hxh-8cp2-g4hg>https://github.com/advisories/GHSA-3hxh-8cp2-g4hg</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1>https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37690>https://nvd.nist.gov/vuln/detail/CVE-2021-37690</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37691</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.1, 2.4.3, 2.3.4, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-27qf-jwm8-g7f3>https://github.com/advisories/GHSA-27qf-jwm8-g7f3</a><br><a href=https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9>https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37691>https://nvd.nist.gov/vuln/detail/CVE-2021-37691</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-37692</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.1, 2.6.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cmgw-8vpc-rc59>https://github.com/advisories/GHSA-cmgw-8vpc-rc59</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22>https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22</a><br><a href=https://github.com/tensorflow/tensorflow/pull/50508>https://github.com/tensorflow/tensorflow/pull/50508</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-37692>https://nvd.nist.gov/vuln/detail/CVE-2021-37692</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41195</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cq76-mxrc-vchh>https://github.com/advisories/GHSA-cq76-mxrc-vchh</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429>https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46888>https://github.com/tensorflow/tensorflow/issues/46888</a><br><a href=https://github.com/tensorflow/tensorflow/pull/51733>https://github.com/tensorflow/tensorflow/pull/51733</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41195>https://nvd.nist.gov/vuln/detail/CVE-2021-41195</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41196</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-m539-j985-hcr8>https://github.com/advisories/GHSA-m539-j985-hcr8</a><br><a href=https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b>https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b</a><br><a href=https://github.com/tensorflow/tensorflow/issues/51936>https://github.com/tensorflow/tensorflow/issues/51936</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41196>https://nvd.nist.gov/vuln/detail/CVE-2021-41196</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41197</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-prcg-wp5q-rv7p>https://github.com/advisories/GHSA-prcg-wp5q-rv7p</a><br><a href=https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85>https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf>https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf</a><br><a href=https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15>https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46890>https://github.com/tensorflow/tensorflow/issues/46890</a><br><a href=https://github.com/tensorflow/tensorflow/issues/51908>https://github.com/tensorflow/tensorflow/issues/51908</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41197>https://nvd.nist.gov/vuln/detail/CVE-2021-41197</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41198</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-2p25-55c9-h58q>https://github.com/advisories/GHSA-2p25-55c9-h58q</a><br><a href=https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f>https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46911>https://github.com/tensorflow/tensorflow/issues/46911</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41198>https://nvd.nist.gov/vuln/detail/CVE-2021-41198</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41199</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-5hx2-qx8j-qjqm>https://github.com/advisories/GHSA-5hx2-qx8j-qjqm</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837>https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46914>https://github.com/tensorflow/tensorflow/issues/46914</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41199>https://nvd.nist.gov/vuln/detail/CVE-2021-41199</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41200</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gh8h-7j2j-qv4f>https://github.com/advisories/GHSA-gh8h-7j2j-qv4f</a><br><a href=https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e>https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46909>https://github.com/tensorflow/tensorflow/issues/46909</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41200>https://nvd.nist.gov/vuln/detail/CVE-2021-41200</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41202</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-xrqm-fpgr-6hhx>https://github.com/advisories/GHSA-xrqm-fpgr-6hhx</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94>https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94</a><br><a href=https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899>https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46889>https://github.com/tensorflow/tensorflow/issues/46889</a><br><a href=https://github.com/tensorflow/tensorflow/issues/46912>https://github.com/tensorflow/tensorflow/issues/46912</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41202>https://nvd.nist.gov/vuln/detail/CVE-2021-41202</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41204</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-786j-5qwq-r36x>https://github.com/advisories/GHSA-786j-5qwq-r36x</a><br><a href=https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659>https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41204>https://nvd.nist.gov/vuln/detail/CVE-2021-41204</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41207</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-7v94-64hj-m82h>https://github.com/advisories/GHSA-7v94-64hj-m82h</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235>https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41207>https://nvd.nist.gov/vuln/detail/CVE-2021-41207</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41209</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6hpv-v2rx-c5g6>https://github.com/advisories/GHSA-6hpv-v2rx-c5g6</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235>https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41209>https://nvd.nist.gov/vuln/detail/CVE-2021-41209</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41213</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-h67m-xg8f-fxcf>https://github.com/advisories/GHSA-h67m-xg8f-fxcf</a><br><a href=https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7>https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41213>https://nvd.nist.gov/vuln/detail/CVE-2021-41213</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41215</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-x3v8-c8qx-3j3r>https://github.com/advisories/GHSA-x3v8-c8qx-3j3r</a><br><a href=https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850>https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41215>https://nvd.nist.gov/vuln/detail/CVE-2021-41215</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41217</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-5crj-c72x-m7gq>https://github.com/advisories/GHSA-5crj-c72x-m7gq</a><br><a href=https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff>https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41217>https://nvd.nist.gov/vuln/detail/CVE-2021-41217</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41218</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9crf-c6qr-r273>https://github.com/advisories/GHSA-9crf-c6qr-r273</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc>https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41218>https://nvd.nist.gov/vuln/detail/CVE-2021-41218</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41222</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-cpf4-wx82-gxp6>https://github.com/advisories/GHSA-cpf4-wx82-gxp6</a><br><a href=https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6>https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41222>https://nvd.nist.gov/vuln/detail/CVE-2021-41222</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-41227</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-j8c8-67vp-6mx7>https://github.com/advisories/GHSA-j8c8-67vp-6mx7</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b>https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b</a><br><a href=https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585>https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-41227>https://nvd.nist.gov/vuln/detail/CVE-2021-41227</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21725</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-v3f7-j968-4h5f>https://github.com/advisories/GHSA-v3f7-j968-4h5f</a><br><a href=https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198>https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198</a><br><a href=https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a>https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21725>https://nvd.nist.gov/vuln/detail/CVE-2022-21725</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21729</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-34f9-hjfq-rr8j>https://github.com/advisories/GHSA-34f9-hjfq-rr8j</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135</a><br><a href=https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af>https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21729>https://nvd.nist.gov/vuln/detail/CVE-2022-21729</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21731</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-m4hf-j54p-p353>https://github.com/advisories/GHSA-m4hf-j54p-p353</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358</a><br><a href=https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022>https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21731>https://nvd.nist.gov/vuln/detail/CVE-2022-21731</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21732</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-c582-c96p-r5cq>https://github.com/advisories/GHSA-c582-c96p-r5cq</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e>https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21732>https://nvd.nist.gov/vuln/detail/CVE-2022-21732</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21733</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-98j8-c9q4-r38g>https://github.com/advisories/GHSA-98j8-c9q4-r38g</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8>https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21733>https://nvd.nist.gov/vuln/detail/CVE-2022-21733</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21734</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gcvh-66ff-4mwm>https://github.com/advisories/GHSA-gcvh-66ff-4mwm</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550</a><br><a href=https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d>https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21734>https://nvd.nist.gov/vuln/detail/CVE-2022-21734</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21735</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-87v6-crgm-2gfj>https://github.com/advisories/GHSA-87v6-crgm-2gfj</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb>https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21735>https://nvd.nist.gov/vuln/detail/CVE-2022-21735</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21736</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-pfjj-m3jj-9jc9>https://github.com/advisories/GHSA-pfjj-m3jj-9jc9</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292</a><br><a href=https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb>https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21736>https://nvd.nist.gov/vuln/detail/CVE-2022-21736</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21737</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-f2vv-v9cg-qhh7>https://github.com/advisories/GHSA-f2vv-v9cg-qhh7</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9>https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21737>https://nvd.nist.gov/vuln/detail/CVE-2022-21737</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21738</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-x4qx-4fjv-hmw6>https://github.com/advisories/GHSA-x4qx-4fjv-hmw6</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273</a><br><a href=https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a>https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21738>https://nvd.nist.gov/vuln/detail/CVE-2022-21738</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21739</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-3mw4-6rj6-74g5>https://github.com/advisories/GHSA-3mw4-6rj6-74g5</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130</a><br><a href=https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559>https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21739>https://nvd.nist.gov/vuln/detail/CVE-2022-21739</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-21741</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-428x-9xc2-m8mj>https://github.com/advisories/GHSA-428x-9xc2-m8mj</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc>https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-21741>https://nvd.nist.gov/vuln/detail/CVE-2022-21741</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23557</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gf2j-f278-xh4v>https://github.com/advisories/GHSA-gf2j-f278-xh4v</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209>https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23557>https://nvd.nist.gov/vuln/detail/CVE-2022-23557</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23563</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-wc4g-r73w-x8mm>https://github.com/advisories/GHSA-wc4g-r73w-x8mm</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wc4g-r73w-x8mm>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wc4g-r73w-x8mm</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23563>https://nvd.nist.gov/vuln/detail/CVE-2022-23563</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23564</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-8rcj-c8pj-v3m3>https://github.com/advisories/GHSA-8rcj-c8pj-v3m3</a><br><a href=https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6>https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23564>https://nvd.nist.gov/vuln/detail/CVE-2022-23564</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23565</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4v5p-v5h9-6xjx>https://github.com/advisories/GHSA-4v5p-v5h9-6xjx</a><br><a href=https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0>https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23565>https://nvd.nist.gov/vuln/detail/CVE-2022-23565</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23567</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-rrx2-r989-2c43>https://github.com/advisories/GHSA-rrx2-r989-2c43</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc</a><br><a href=https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md>https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8>https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510>https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23567>https://nvd.nist.gov/vuln/detail/CVE-2022-23567</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23568</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-6445-fm66-fvq2>https://github.com/advisories/GHSA-6445-fm66-fvq2</a><br><a href=https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc>https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8>https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8</a><br><a href=https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c>https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23568>https://nvd.nist.gov/vuln/detail/CVE-2022-23568</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23569</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-qj5r-f9mv-rffh>https://github.com/advisories/GHSA-qj5r-f9mv-rffh</a><br><a href=https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md>https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23569>https://nvd.nist.gov/vuln/detail/CVE-2022-23569</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23570</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9p77-mmrw-69c7>https://github.com/advisories/GHSA-9p77-mmrw-69c7</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106</a><br><a href=https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c>https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23570>https://nvd.nist.gov/vuln/detail/CVE-2022-23570</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23571</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-j3mj-fhpq-qqjj>https://github.com/advisories/GHSA-j3mj-fhpq-qqjj</a><br><a href=https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3>https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23571>https://nvd.nist.gov/vuln/detail/CVE-2022-23571</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23572</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-rww7-2gpw-fv6j>https://github.com/advisories/GHSA-rww7-2gpw-fv6j</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174</a><br><a href=https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b>https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23572>https://nvd.nist.gov/vuln/detail/CVE-2022-23572</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23575</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-c94w-c95p-phf8>https://github.com/advisories/GHSA-c94w-c95p-phf8</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558</a><br><a href=https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e>https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23575>https://nvd.nist.gov/vuln/detail/CVE-2022-23575</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23576</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-wm93-f238-7v37>https://github.com/advisories/GHSA-wm93-f238-7v37</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617</a><br><a href=https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae>https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23576>https://nvd.nist.gov/vuln/detail/CVE-2022-23576</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23577</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-8cxv-76p7-jxwr>https://github.com/advisories/GHSA-8cxv-76p7-jxwr</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61</a><br><a href=https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250>https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23577>https://nvd.nist.gov/vuln/detail/CVE-2022-23577</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23578</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-8r7c-3cm2-3h8f>https://github.com/advisories/GHSA-8r7c-3cm2-3h8f</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262</a><br><a href=https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd>https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23578>https://nvd.nist.gov/vuln/detail/CVE-2022-23578</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23579</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-5f2r-qp73-37mr>https://github.com/advisories/GHSA-5f2r-qp73-37mr</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98</a><br><a href=https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662>https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23579>https://nvd.nist.gov/vuln/detail/CVE-2022-23579</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23580</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-627q-g293-49q7>https://github.com/advisories/GHSA-627q-g293-49q7</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7>https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23580>https://nvd.nist.gov/vuln/detail/CVE-2022-23580</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23581</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-fq86-3f29-px2c>https://github.com/advisories/GHSA-fq86-3f29-px2c</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742</a><br><a href=https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082>https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082</a><br><a href=https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6>https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1>https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23581>https://nvd.nist.gov/vuln/detail/CVE-2022-23581</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23582</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-4j82-5ccr-4r8v>https://github.com/advisories/GHSA-4j82-5ccr-4r8v</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50</a><br><a href=https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02>https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23582>https://nvd.nist.gov/vuln/detail/CVE-2022-23582</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23583</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-gjqc-q9g6-q2j3>https://github.com/advisories/GHSA-gjqc-q9g6-q2j3</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137</a><br><a href=https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9>https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23583>https://nvd.nist.gov/vuln/detail/CVE-2022-23583</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23584</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-24x4-6qmh-88qg>https://github.com/advisories/GHSA-24x4-6qmh-88qg</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b>https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23584>https://nvd.nist.gov/vuln/detail/CVE-2022-23584</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23585</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-fq6p-6334-8gr4>https://github.com/advisories/GHSA-fq6p-6334-8gr4</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416</a><br><a href=https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9>https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23585>https://nvd.nist.gov/vuln/detail/CVE-2022-23585</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23586</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-43jf-985q-588j>https://github.com/advisories/GHSA-43jf-985q-588j</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc</a><br><a href=https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645>https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645</a><br><a href=https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2>https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23586>https://nvd.nist.gov/vuln/detail/CVE-2022-23586</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23588</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-fx5c-h9f6-rv7c>https://github.com/advisories/GHSA-fx5c-h9f6-rv7c</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402</a><br><a href=https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6>https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23588>https://nvd.nist.gov/vuln/detail/CVE-2022-23588</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23589</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-9px9-73fg-3fqp>https://github.com/advisories/GHSA-9px9-73fg-3fqp</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74</a><br><a href=https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497>https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497</a><br><a href=https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf>https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf</a><br><a href=https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1>https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23589>https://nvd.nist.gov/vuln/detail/CVE-2022-23589</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2022-23595</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.5.3, 2.6.3, 2.7.1, 2.8.0</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-fpcp-9h7m-ffpx>https://github.com/advisories/GHSA-fpcp-9h7m-ffpx</a><br><a href=https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104>https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104</a><br><a href=https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8>https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-23595>https://nvd.nist.gov/vuln/detail/CVE-2022-23595</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>GHSA-wcv5-vrvr-3rx2</td> <td align=center>MEDIUM</td> <td align=center>2.5.0</td> <td align=center>2.7.1, 2.6.3, 2.5.3</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-wcv5-vrvr-3rx2>https://github.com/advisories/GHSA-wcv5-vrvr-3rx2</a><br><a href=https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058>https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p</a><br><a href=https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2>https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22898</td> <td align=center>LOW</td> <td align=center>2.5.0</td> <td align=center>2.6.0, 2.5.1, 2.4.3, 2.3.4</td> <td><details><summary>Expand...</summary><a href=http://www.openwall.com/lists/oss-security/2021/07/21/4>http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22898.html>https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href=https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde>https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href=https://hackerone.com/reports/1176461>https://hackerone.com/reports/1176461</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22898.html>https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-4511.html>https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href=https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E>https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://ubuntu.com/security/notices/USN-5021-2>https://ubuntu.com/security/notices/USN-5021-2</a><br><a href=https://www.oracle.com//security-alerts/cpujul2021.html>https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details></td> </tr> <tr> <td align=left>tensorflow</td> <td align=center>CVE-2021-22924</td> <td align=center>LOW</td> <td align=center>2.5.0</td> <td align=center>2.4.4, 2.5.2, 2.6.1</td> <td><details><summary>Expand...</summary><a href=https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf>https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href=https://curl.se/docs/CVE-2021-22924.html>https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href=https://hackerone.com/reports/1223565>https://hackerone.com/reports/1223565</a><br><a href=https://linux.oracle.com/cve/CVE-2021-22924.html>https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2021-3582.html>https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E>https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href=https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html>https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href=https://security.netapp.com/advisory/ntap-20210902-0003/ >https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href=https://ubuntu.com/security/notices/USN-5021-1>https://ubuntu.com/security/notices/USN-5021-1</a><br><a href=https://www.oracle.com/security-alerts/cpujan2022.html>https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href=https://www.oracle.com/security-alerts/cpuoct2021.html>https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details></td> </tr> <tr> <td align=left>ujson</td> <td align=center>CVE-2021-45958</td> <td align=center>MEDIUM</td> <td align=center>4.0.2</td> <td align=center>5.1.0</td> <td><details><summary>Expand...</summary><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009</a><br><a href=https://github.com/advisories/GHSA-fh56-85cw-5pq6>https://github.com/advisories/GHSA-fh56-85cw-5pq6</a><br><a href=https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml>https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml</a><br><a href=https://github.com/ultrajson/ultrajson/issues/501>https://github.com/ultrajson/ultrajson/issues/501</a><br><a href=https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284>https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284</a><br><a href=https://github.com/ultrajson/ultrajson/pull/504>https://github.com/ultrajson/ultrajson/pull/504</a><br><a href=https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html>https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-45958>https://nvd.nist.gov/vuln/detail/CVE-2021-45958</a><br></details></td> </tr> </tbody> </table> <p><strong>gobinary</strong></p> <table> <thead> <tr> <th align=left>No Vulnerabilities found</th> </tr> </thead> <tbody> <tr> <td></td> </tr> </tbody> </table> <p><strong>gobinary</strong></p> <table> <thead> <tr> <th align=left>Package</th> <th align=center>Vulnerability</th> <th align=center>Severity</th> <th align=center>Installed Version</th> <th align=center>Fixed Version</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>github.com/prometheus/prometheus</td> <td align=center>CVE-2019-3826</td> <td align=center>MEDIUM</td> <td align=center>v2.5.0+incompatible</td> <td align=center>v2.7.1</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/errata/RHBA-2019:0327>https://access.redhat.com/errata/RHBA-2019:0327</a><br><a href=https://advisory.checkmarx.net/advisory/CX-2019-4297>https://advisory.checkmarx.net/advisory/CX-2019-4297</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3826">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3826</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3826">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3826</a><br><a href=https://github.com/prometheus/prometheus/commit/62e591f9>https://github.com/prometheus/prometheus/commit/62e591f9</a><br><a href=https://github.com/prometheus/prometheus/pull/5163>https://github.com/prometheus/prometheus/pull/5163</a><br><a href=https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E</a><br><a href=https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E>https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-3826>https://nvd.nist.gov/vuln/detail/CVE-2019-3826</a><br></details></td> </tr> </tbody> </table> <p><strong>gobinary</strong></p> <table> <thead> <tr> <th align=left>Package</th> <th align=center>Vulnerability</th> <th align=center>Severity</th> <th align=center>Installed Version</th> <th align=center>Fixed Version</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>github.com/dgrijalva/jwt-go</td> <td align=center>CVE-2020-26160</td> <td align=center>HIGH</td> <td align=center>v3.2.0+incompatible</td> <td align=center></td> <td><details><summary>Expand...</summary><a href=https://github.com/dgrijalva/jwt-go/pull/426>https://github.com/dgrijalva/jwt-go/pull/426</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-26160>https://nvd.nist.gov/vuln/detail/CVE-2020-26160</a><br><a href=https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515>https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515</a><br></details></td> </tr> <tr> <td align=left>github.com/mholt/archiver</td> <td align=center>CVE-2019-10743</td> <td align=center>MEDIUM</td> <td align=center>v3.1.1+incompatible</td> <td align=center>3.3.2</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-h74j-692g-48mq>https://github.com/advisories/GHSA-h74j-692g-48mq</a><br><a href=https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a>https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a</a><br><a href=https://github.com/mholt/archiver/pull/169>https://github.com/mholt/archiver/pull/169</a><br><a href=https://github.com/mholt/archiver/pull/203>https://github.com/mholt/archiver/pull/203</a><br><a href=https://github.com/snyk/zip-slip-vulnerability>https://github.com/snyk/zip-slip-vulnerability</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-10743>https://nvd.nist.gov/vuln/detail/CVE-2019-10743</a><br><a href=https://snyk.io/research/zip-slip-vulnerability>https://snyk.io/research/zip-slip-vulnerability</a><br><a href=https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728>https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728</a><br><a href=https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,>https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,</a><br></details></td> </tr> <tr> <td align=left>github.com/miekg/dns</td> <td align=center>CVE-2019-19794</td> <td align=center>MEDIUM</td> <td align=center>v1.1.3</td> <td align=center>1.1.25-0.20191211073109-8ebf2e419df7</td> <td><details><summary>Expand...</summary><a href=https://github.com/advisories/GHSA-44r7-7p62-q3fr>https://github.com/advisories/GHSA-44r7-7p62-q3fr</a><br><a href=https://github.com/coredns/coredns/issues/3519>https://github.com/coredns/coredns/issues/3519</a><br><a href=https://github.com/coredns/coredns/issues/3547>https://github.com/coredns/coredns/issues/3547</a><br><a href=https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33>https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33</a><br><a href=https://github.com/miekg/dns/compare/v1.1.24...v1.1.25>https://github.com/miekg/dns/compare/v1.1.24...v1.1.25</a><br><a href=https://github.com/miekg/dns/issues/1043>https://github.com/miekg/dns/issues/1043</a><br><a href=https://github.com/miekg/dns/pull/1044>https://github.com/miekg/dns/pull/1044</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2019-19794>https://nvd.nist.gov/vuln/detail/CVE-2019-19794</a><br></details></td> </tr> <tr> <td align=left>github.com/ulikunitz/xz</td> <td align=center>CVE-2020-16845</td> <td align=center>HIGH</td> <td align=center>v0.5.6</td> <td align=center>0.5.8</td> <td><details><summary>Expand...</summary><a href=http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html>http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html>http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html</a><br><a href=http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html>http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845</a><br><a href=https://github.com/advisories/GHSA-q6gq-997w-f55g>https://github.com/advisories/GHSA-q6gq-997w-f55g</a><br><a href=https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b>https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b</a><br><a href=https://github.com/ulikunitz/xz/issues/35>https://github.com/ulikunitz/xz/issues/35</a><br><a href=https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo>https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo</a><br><a href=https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q>https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q</a><br><a href=https://groups.google.com/g/golang-announce/c/NyPIaucMgXo>https://groups.google.com/g/golang-announce/c/NyPIaucMgXo</a><br><a href=https://linux.oracle.com/cve/CVE-2020-16845.html>https://linux.oracle.com/cve/CVE-2020-16845.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-5828.html>https://linux.oracle.com/errata/ELSA-2020-5828.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html>https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html</a><br><a href=https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html>https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-16845>https://nvd.nist.gov/vuln/detail/CVE-2020-16845</a><br><a href=https://security.netapp.com/advisory/ntap-20200924-0002/ >https://security.netapp.com/advisory/ntap-20200924-0002/</a><br><a href=https://www.debian.org/security/2021/dsa-4848>https://www.debian.org/security/2021/dsa-4848</a><br><a href=https://www.oracle.com/security-alerts/cpuApr2021.html>https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details></td> </tr> <tr> <td align=left>github.com/ulikunitz/xz</td> <td align=center>CVE-2021-29482</td> <td align=center>HIGH</td> <td align=center>v0.5.6</td> <td align=center>0.5.8</td> <td><details><summary>Expand...</summary><a href=https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b>https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b</a><br><a href=https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27>https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2021-29482>https://nvd.nist.gov/vuln/detail/CVE-2021-29482</a><br></details></td> </tr> <tr> <td align=left>golang.org/x/text</td> <td align=center>CVE-2020-14040</td> <td align=center>HIGH</td> <td align=center>v0.3.2</td> <td align=center>0.3.3</td> <td><details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040</a><br><a href=https://github.com/advisories/GHSA-5rcv-m4m3-hfh7>https://github.com/advisories/GHSA-5rcv-m4m3-hfh7</a><br><a href=https://github.com/golang/go/issues/39491>https://github.com/golang/go/issues/39491</a><br><a href=https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e>https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e</a><br><a href=https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0>https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0</a><br><a href=https://linux.oracle.com/cve/CVE-2020-14040.html>https://linux.oracle.com/cve/CVE-2020-14040.html</a><br><a href=https://linux.oracle.com/errata/ELSA-2020-4694.html>https://linux.oracle.com/errata/ELSA-2020-4694.html</a><br><a href=https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ >https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2020-14040>https://nvd.nist.gov/vuln/detail/CVE-2020-14040</a><br></details></td> </tr> <tr> <td align=left>golang.org/x/text</td> <td align=center>CVE-2021-38561</td> <td align=center>UNKNOWN</td> <td align=center>v0.3.2</td> <td align=center>0.3.7</td> <td><details><summary>Expand...</summary></details></td> </tr> </tbody> </table> <p><strong>gobinary</strong></p> <table> <thead> <tr> <th align=left>No Vulnerabilities found</th> </tr> </thead> <tbody> <tr> <td></td> </tr> </tbody> </table> <p><strong>gobinary</strong></p> <table> <thead> <tr> <th align=left>No Vulnerabilities found</th> </tr> </thead> <tbody> <tr> <td></td> </tr> </tbody> </table> </article> </div> </div> </main> <footer class=md-footer> <nav class="md-footer__inner md-grid" aria-label=Footer> <a href=../helm-values/ class="md-footer__link md-footer__link--prev" aria-label="Previous: Default Helm-Values" rel=prev> <div class="md-footer__button md-icon"> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 24 24"><path d="M20 11v2H8l5.5 5.5-1.42 1.42L4.16 12l7.92-7.92L13.5 5.5 8 11h12Z"/></svg> </div> <div class=md-footer__title> <div class=md-ellipsis> <span class=md-footer__direction> Previous </span> Default Helm-Values </div> </div> </a> <a href=../../nextpvr/ class="md-footer__link md-footer__link--next" aria-label="Next: Introduction" rel=next> <div class=md-footer__title> <div class=md-ellipsis> <span class=md-footer__direction> Next </span> Introduction </div> </div> <div class="md-footer__button md-icon"> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 24 24"><path d="M4 11v2h12l-5.5 5.5 1.42 1.42L19.84 12l-7.92-7.92L10.5 5.5 16 11H4Z"/></svg> </div> </a> </nav> <div class="md-footer-meta md-typeset"> <div class="md-footer-meta__inner md-grid"> <div class=md-copyright> <div class=md-copyright__highlight> Copyright &copy; 2020 - 2022 The TrueCharts Project </div> </div> </div> </div> </footer> </div> <div class=md-dialog data-md-component=dialog> <div class="md-dialog__inner md-typeset"></div> </div> <script id=__config type=application/json>{"base": "../../../..", "features": ["navigation.tabs", "navigation.tracking", "navigation.instant", "search.highlight", "search.share", "search.suggest"], "search": "../../../../assets/javascripts/workers/search.b97dbffb.min.js", "translations": {"clipboard.copied": "Copied to clipboard", "clipboard.copy": "Copy to clipboard", "search.config.lang": "en", "search.config.pipeline": "trimmer, stopWordFilter", "search.config.separator": "[\\s\\-]+", "search.placeholder": "Search", "search.result.more.one": "1 more on this page", "search.result.more.other": "# more on this page", "search.result.none": "No matching documents", "search.result.one": "1 matching document", "search.result.other": "# matching documents", "search.result.placeholder": "Type to start searching", "search.result.term.missing": "Missing", "select.version.title": "Select version"}}</script> <script src=../../../../assets/javascripts/bundle.0238f547.min.js></script> </body> </html>